Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Make enquiry
Not working
HTML
Risk AssessmentBusiness Process ImprovementsArchitecture and DesignRegulatory Compliance & AuditTeam ManagementRisk ManagementCloud securityRisk Assessment and AuditCyber security standardsRisk analytics and management
Make enquiry
Not working
HTML
TableauIBM SPSS StatisticsAI / Machine Learning5GMicrosoft ExcelMicrosoft Power BIVisual BasicRSVPFlask (Python)Virtualisation
Make enquiry
Not working
HTML
BlockchainComputer security models‎BPMN (Business Process Model and Notation)Threat Intelligence and ModellingComplex Systems EngineeringopenFrameworksProcessingRequirements CaptureCyber Resilience ReviewWeb front-end
Make enquiry
HTML
UbuntuRedisRabbitMQPostgreSQLOracleNginxMongoDBMicrosoft SQL Server MSSQLMicrosoftJenkins
Make enquiry
Not working
HTML
AgileIT MigrationsIT Transition and TransformationBankingPlanning & SchedulingBudget ManagementProcess CreationProcess ManagementSalesSoftware Development
Make enquiry
Not working
HTML
FlutterWeb front-endUbuntuTeam ManagementSQLSpring (Java)RESTRedisRedHat Enterprise Linux 7.xReact
Make enquiry
HTML
ReactPostgreSQLTypeScriptAmazon (AWS) EC2Amazon (AWS) Elastic Container Registry (ECR)AWS LambdaAWS S3Amazon Web ServicesJavaScriptPython
Make enquiry
HTML
AndroidApple iOSJavaJavaScriptProject ManagementSWIFTFirebaseGoogle Cloud PlatformDevOpsDjango (Python)
Make enquiry
Not working
HTML
SOAMiddlewareJavaScriptJavaDocumentationOracle ADF
Make enquiry
HTML
Amazon AWSAmazon Web ServicesBackup / StorageSupportArchitectureWordpressMicrosoftApacheMySQLJ2EE
Make enquiry
HTML
C++JavaScriptPerlPythonLinuxFX & MMTrading PlatformsFIXCMicrosoft Windows
Make enquiry
HTML
PythonJavaScriptCSS
Make enquiry
Not working
HTML
ShellPerlRed Hat LinuxPythonSQLMySQLAutomationMariaDBMicrosoft SQL Server MSSQLScripting and programming
Make enquiry
HTML
ArchitectureObject Oriented DesignRefactoringContinuous Integration / Deployment (CI/CD)RESTLegacy CodeFunctional ProgrammingStakeholder CommunicationSOAPA/B Testing
Make enquiry
Not working
HTML
Visual Source SafeVisual Studio OnlineMicrosoft Team Foundation ServerApache JMeterSelenium WebDriverAtlassian ConfluenceJSONAtlassian JiraServiceNowVisual Basic .NET 
Make enquiry
HTML
MPLSData CentreVoice / TelephonyCisco ASR 9000 SeriesCiscoNetwork SupportNetwork ImplementationL3 VPNNetwork DesignIPSec
Make enquiry
HTML
TroubleshootingNetwork SupportSplunkNetworks
Make enquiry
HTML
Network ImplementationNATEIGRPDNSServer Load BalancingGREIP SLAVPCVSSPacket Analysis
Make enquiry
HTML
Express.jsBootstrapReactAngularJsAngular 4Node.jsMongoDBNetwork ImplementationDockerREST
Make enquiry
HTML
Access control‎Architecture and DesignSSLIntrusion Detection and PreventionNetwork SecurityInfrastructure SecuritySplunkRisk Assessment and AuditMalware DetectionFirewalls
Make enquiry
Not working
HTML
Cloud securityData Leak PreventionCyber security standardsThreat & Vulnerability ManagementRisk ManagementPolicy and strategyCompliance and AuditArchitecture and DesignRisk Assessment and AuditData protection
Make enquiry
HTML
Architecture and DesignData security‎Identity and Access ManagementPCI-DSSCyber StrategyRegulatory Compliance & AuditMicrosoft Office 365Privileged identity managementPriviledged Access ManagementRisk Management
Make enquiry
HTML
ScrumAgileShellPL/SQL SQLJavaScriptJavaDockerPython
Make enquiry
HTML
Vulnerability ManagementThreat & Vulnerability ManagementSecurity information and event management (SIEM)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Penetration Testing (Web)Business Process ImprovementsF5 BIGiPNetwork Security
Make enquiry
Not working
HTML
TypeScriptSCSSReactPHPNodeJSjQueryJestJavaScriptDocker
Make enquiry
HTML
Team ManagementArchitecture and DesignCompliance and AuditGeneral Data Protection Regulation (GDPR)ISO 27001Infrastructure SecurityNetwork SecurityBankingInformation Security3rd-Party Security Risk