Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Not working
ISO 27001NISTIT Risk Management‎ITSECCyber Resilience ReviewCyber SecurityCyber security standardsCyber Strategy
Data CentreInfrastructure SupportTrading Floor & PlatformsStakeholder ManagementEscalation ManagementProject ReportingWAN (Continental)WAN (Nationwide)WAN (Global)IT Monitoring Tools & Management
Not working
Akamai ProlexicBlue CoatPalo Alto NetworksJuniper NetworksF5CiscoCheck PointAmazon AWSCitrix NetScalerMicrosoft Azure
Not working
Wireless RF SurveyNetwork SupportNetwork DesignNetwork ImplementationNetwork SecurityDNSFirewall PoliciesIT Monitoring Tools & Management
Not working
ITILv3ITILStakeholder ManagementService Level ManagementIT Service ManagementServiceNowProject ManagementService DesignService Transition
Not working
Network SupportArchitectureNetwork DesignNetwork ImplementationNetwork SecurityCiscoCampus LAN (Large)Cisco Nexus SeriesData CentreNetwork Deployment
PythonL3 VPNL2 VPNL2TPTCP/IPBGPMPLSIPSecIPOSPF
Anti Money LaunderingPolicy & Procedure WritingGovernanceRegulatory ComplianceFraudLegalRegulatory AffairsReport WritingRegulator EngagementKYC CDD Onboarding
Not working
Red Hat Linux
Not working
Strategic Design and Business PlanningService DesignEnterprise ArchitectureBusiness Process
Not working
Data CentreCiscoCisco NX-OSCisco Nexus SeriesF5 LTMF5Network DeploymentNetwork ImplementationData NetworksWeb Application Firewall
Network SecurityCampus LAN (Large)Campus LAN (Medium)Campus LAN (Small)Network DesignNetwork ImplementationBGPCisco ASAFirewall PoliciesIT Monitoring Tools & Management
PrivacyThird Party Risk ManagementCyber Resilience Review
ISISNetwork SupportIPSecMPLSData NetworksOSPFBGPCisco
ConsultancyISO 27001Information SecurityThird Party Security Audit3rd-Party Security RiskIT SecuritySecurity transformation programmesSecurity Operations Centre (SOC)Network SecurityTraining and Awareness
Not working
Not working
Team ManagementStakeholder ManagementProject ReportingChange Management
Technical projectsCiscoPRINCE2Budget ManagementIT MigrationsData NetworksData CentreIT InfrastructureIT SecurityCisco Catalyst 4500 Series
Not working
IT Monitoring Tools & ManagementNetwork SupportData CentreDMVPNIPv6OSPFEIGRPBGPFirewall PoliciesNAT
Not working
Data NetworksCiscoNetwork DesignNetwork ImplementationCampus LAN (Large)Cisco Catalyst 6500 SeriesCisco Nexus 7000 SeriesCisco Nexus 5000 SeriesCisco ASAFirewall Policies
Access control‎Architecture and DesignSSLIntrusion Detection and PreventionNetwork SecurityInfrastructure SecuritySplunkRisk Assessment and AuditMalware DetectionFirewalls
Not working
Not working
WiresharkBGPIPv4DNSSSLVPNTCP/IPIPSecIntrusion Detection and PreventionCloud security
Not working
Interaction DesignWireframesWorkflow diagramsCustomer ResearchPersona creationUsability testingInformation architectureUX StrategyUser flows / customer journeysSketches
Not working
Prince 2Project ManagementProject DeliveryScrum MasterTeam Management
Not working
Vulnerability ManagementSecurity ArchitectureNetwork Security
Process CreationProcess ManagementModels & AnalyticsAgileAnti Money LaunderingSoftware design & developmentKYC CDD OnboardingChange DeliveryRegulatory ComplianceMiFiD
Not working
Data Centre
Not working
Technology AuditTechnology ConsultingTechnology riskCyber SecurityTeam ManagementStakeholder ManagementProject ManagementIT Monitoring Tools & ManagementChange ManagementBudget Management
Not working
Process ManagementStakeholder ManagementTeam ManagementProcess ImprovementTrainingMentoringIT SecurityPlanning & SchedulingBusiness projectsSales