Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
HTML
Architecture and DesignIdentity and Access ManagementPCI-DSSData security‎Regulatory Compliance & AuditCyber StrategyPrivileged identity managementPriviledged Access ManagementRisk ManagementData Leak Prevention
Make enquiry
HTML
TypeScriptSCSSReactPHPNodeJSjQueryJestJavaScriptDocker
HTML
Team ManagementArchitecture and DesignCompliance and AuditGeneral Data Protection Regulation (GDPR)ISO 27001Infrastructure SecurityNetwork SecurityBankingInformation Security3rd-Party Security Risk
HTML
Vue.jsAngularJsCSSES6ReduxReact
Make enquiry
HTML
FlutterWeb front-endUbuntuTeam ManagementSQLSpring (Java)RESTRedisRedHat Enterprise Linux 7.xReact
HTML
ScrumAgileShellPL/SQL SQLJavaScriptJavaDockerPython
HTML
Vulnerability ManagementThreat & Vulnerability ManagementSecurity information and event management (SIEM)Penetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Network)Penetration Testing (Web)Network SecurityBusiness Process ImprovementsF5 BIGiP
Make enquiry
HTML
Voice / TelephonyNetwork DesignWAN (Global)WAN (Nationwide)WAN (Continental)ArchitectureQoSCisco CUCM Call ManagerNetwork SupportRequirements Capture
HTML
Access control‎Network SecurityArchitecture and DesignSSLIntrusion Detection and PreventionInfrastructure SecuritySplunkRisk Assessment and AuditMalware DetectionFirewalls
HTML
Project ManagementData security‎Data Storage / SANContract ManagementContract NegotiationNetworksArchitecture and DesignStrategySupplier ManagementIT Migrations
Make enquiry
HTML
ScrumAgileSpring MVCSoftware design & developmentPHPJavaScriptCSSPythonMySQL
Make enquiry
HTML
AgileIT MigrationsIT Transition and TransformationBankingPlanning & SchedulingBudget ManagementProcess CreationProcess ManagementSalesSoftware Development
Make enquiry
HTML
Scope ManagementMentoringPenetration Testing (Network)Client Management - External FacingClient Management - Internal FacingPenetration Testing (Web)Penetration Testing (Systems)Penetration Testing (Applications)Training and AwarenessNetwork Security
Make enquiry
HTML
Remote Access / VPNVisual Basic .NET Distributed ComputingDatabase AdminstrationMicrosoft Visual StudioSAPMicrosoft SQL Server MSSQLPrometheusIT Monitoring Tools & Management
HTML
Express.jsBootstrapReactAngularJsAngular 4Node.jsMongoDBNetwork ImplementationDockerREST
HTML
ArchitectureObject Oriented DesignRefactoringContinuous Integration / Deployment (CI/CD)RESTLegacy CodeFunctional ProgrammingStakeholder CommunicationSOAPA/B Testing
Make enquiry
HTML
ShellPerlRed Hat LinuxPythonSQLMySQLAutomationSybaseScripting and programmingMicrosoft SQL Server MSSQL
HTML
PythonJavaScriptCSS
Make enquiry
HTML
BlockchainComputer security models‎BPMN (Business Process Model and Notation)Threat Intelligence and ModellingComplex Systems EngineeringopenFrameworksProcessingRequirements CaptureCyber Resilience ReviewWeb front-end
HTML
UbuntuRedisRabbitMQPostgreSQLOracleNginxMongoDBMicrosoft SQL Server MSSQLMicrosoftJenkins
Make enquiry
HTML
IT Transition and TransformationTechnical projectsIT LifecycleIT InfrastructurePostgreSQLMySQLDockerGitUbuntuHeroku
HTML
ReactPostgreSQLTypeScriptAmazon (AWS) EC2Amazon (AWS) Elastic Container Registry (ECR)AWS LambdaAWS S3Amazon Web ServicesJavaScriptPython
HTML
AndroidApple iOSJavaJavaScriptProject ManagementSWIFTFirebaseGoogle Cloud PlatformDevOpsDjango (Python)
Make enquiry
HTML
SOAMiddlewareJavaScriptJavaDocumentationOracle ADF
Make enquiry
HTML
Transact-SQL (T-SQL)Microsoft SQL Server Reporting Services (SSRS)Microsoft SQL Server MSSQLGitHubRESTJavaASP.NETC#GitSQL
HTML
SAPOracle ERPEclipseMacOSWindows EngineeringVisual Studio OnlineCSSSQLJavaScript