Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Not working
Vulnerability ManagementSecurity ArchitectureNetwork Security
Process CreationProcess ManagementModels & AnalyticsAgileAnti Money LaunderingSoftware design & developmentKYC CDD OnboardingChange DeliveryRegulatory ComplianceMiFiD
Not working
Data Centre
Not working
Technology AuditTechnology ConsultingTechnology riskCyber SecurityTeam ManagementStakeholder ManagementProject ManagementIT Monitoring Tools & ManagementChange ManagementBudget Management
Not working
Process ManagementStakeholder ManagementTeam ManagementProcess ImprovementTrainingMentoringIT SecurityPlanning & SchedulingBusiness projectsSales
Not working
Network SupportNetwork SecurityNetwork ImplementationNetwork Deployment
Not working
Cyber EssentialsInformation Systems AuditPCI AuditThird Party Security AuditIT Monitoring Tools & Management
Team ManagementBudget ManagementForecasting of Costs & RevenueRisk ManagementProject ReportingIT InfrastructureIT MigrationsTechnical projectsStakeholder ManagementData Centre Migrations
Data CentreVoice / TelephonyMPLSNetwork DesignNetwork ImplementationIT InfrastructureF5Juniper NetworksCheck PointNetwork Support
Planning & SchedulingTeam ManagementService Delivery ManagementOrganisational TransformationManagement and leadershipBudget ManagementTechnical projectsIT LifecycleIT UpgradesIT Infrastructure
Not working
RailGroundworks
Not working
JavaScriptCSSHTMLReactAngular 4ExtJSAngularJsObjective-CjQueryPHPUnit
User testingClient ManagementProject ManagementMiroFigmaAdobe LightroomCollaborative designResponsive designMobile UI designVisual Design
Not working
ForcepointPalo Alto NetworksVulnerability ManagementEthical HackingThreat Intelligence and ModellingThreat HuntingThreat & Vulnerability ManagementSymantec AntivirusIPSSecurity Operations Centre (SOC)
Not working
Technical projects
Not working
Security target operating modelsService DesignService Transition
Not working
VMware ESXi5VMware ESXi5.5VMware ESXi6VMware vCentreVMware vSphere 6VMware vSphere 5VMware WorkstationData CentreIP SLACampus LAN (Medium)
Not working
Team ManagementAgileRESTJenkinsTypeScriptReduxAPICSSGitHTML
Risk ManagementNetwork DeploymentNetwork ImplementationBusiness projectsIT MigrationsIT UpgradesChange ManagementTechnical projectsStakeholder ManagementIT Infrastructure
Not working
Monitoringazure devopsCloudFormationTerraformKubernetesBGPDNSIPSecJenkinsAmazon Web Services
Security target operating modelsRelease ManagementAgileProject/Programme ScopingIT TransformationDEVOPS
Cisco CUCM Call ManagerCisco Cube SPCisco Branch Routers / ISRCisco Voice GatewaysMicrosoft Lync 2013Microsoft Skype for Business 2015MicrosoftCiscoVoice / TelephonyNetwork Security
Planning & SchedulingProject ReportingData NetworksIT MigrationsSupplier ManagementStakeholder ManagementIT Transition and TransformationResource ManagementRisk ManagementDesktop
Not working
Network DesignCisco Catalyst 3700 SeriesNetwork ImplementationNetwork SupportCheck PointCisco Nexus SeriesData CentreCisco Nexus 5000 SeriesWAN (Nationwide)Wireless
CiscoPre-Sales / Post-SalesData NetworksData CentreNetwork Support
Not working
mBGPiBGPeBGPAnycastMulticast (PIM)BroadcastCisco FEXDatacentre MigrationTCP/IPL3 VPN
Not working
AgileIT MigrationsIT Transition and TransformationBankingPlanning & SchedulingBudget ManagementProcess CreationProcess ManagementSalesSoftware Development
Not working
Technical projectsIT Transition and TransformationIT LifecycleIT UpgradesIT MigrationsIT InfrastructureDigitalData Centre MigrationsCloud MigrationsBackup and Restore