Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Make enquiry
Security InvestigationsSecurity Operations Centre (SOC)Threat Intelligence and ModellingISO 27001Cyber EssentialsCommon Vulnerability Scoring System (CVSS)Vulnerability ManagementThreat & Vulnerability ManagementInformation privacy‎Information Security
Make enquiry
Data NetworksNetwork ImplementationData CentreCiscoBGPVxLANVMware NSXNetwork SecurityNetwork DesignIT Monitoring Tools & Management
Make enquiry
Risk AssessmentRisk ManagementCompliance ManagementVulnerability ManagementCheck PointCiscoCisco ASAPolicy and strategyAccess control‎Risk Assessment and Audit
Make enquiry
Penetration Testing (Network)Penetration Testing (Systems)Data Leak PreventionNetwork SecurityAuditArchitectureThreat management and forensicsThreat & Vulnerability ManagementArchitecture and DesignTraining and Awareness
Make enquiry
ForcepointPalo Alto NetworksVulnerability ManagementEthical HackingThreat Intelligence and ModellingThreat HuntingThreat & Vulnerability ManagementSymantec AntivirusIPSSecurity Operations Centre (SOC)
Make enquiry
Make enquiry
InfrastructureWAN (Global)WAN (Nationwide)WAN (Continental)Data CentreCampus LAN (Large)Campus LAN (Small)Campus LAN (Medium)IT TransformationVoice / Telephony
Make enquiry
Network DesignNetworksNetwork ConnectivityNetwork ImplementationL3 VPNOSPFNTP / PTPMPLSL2 SecurityFirewall Policies
Make enquiry
Firewall PoliciesData CentreArchitectureNetwork Access Control (NAC)WirelessNetAppNetwork ImplementationNetwork DesignCisco Nexus 7000 SeriesCisco Nexus 5000 Series
Make enquiry
CiscoData NetworksNetwork ImplementationNetwork DesignOSPFVLAN / 802.1qEIGRPNATNetwork SecurityBGP
Make enquiry
Service Level AgreementProcess OptimizationProcess ManagementProcess Modelling / DesignProblem ManagementITILIT GovernanceIncident ManagementCOBITChange Management
Make enquiry
Scope ManagementMentoringPenetration Testing (Network)Client Management - External FacingClient Management - Internal FacingTraining and AwarenessNetwork SecurityPenetration Testing (Applications)Penetration Testing (Systems)Penetration Testing (Web)
Make enquiry
Compliance ManagementIT SecurityClient Management - External FacingContract ManagementSupplier ManagementBudget ManagementClient Management - Internal FacingGovernanceAccess control‎Planning & Scheduling
Make enquiry
Network SecurityArchitecture and DesignPCI-DSSData CentreDatacentre MigrationCiscoISO 27001ISO/IEC 27002Cyber security standardsPenetration Testing (Network)
Make enquiry
Network SupportNetwork SecurityNetwork ImplementationNetwork Deployment
Make enquiry
Stakeholder ManagementBusiness Analysisprocess analysisGap AnalysisRegulatory Compliance & AuditProcess Modelling / DesignGeneral Data Protection Regulation (GDPR)BSI AccreditationBusiness ApplicationsProcess Improvement
Make enquiry
eBGPQualysFortinetChange ApprovalPalo Alto NetworksMicrosoftCisco LAN Access SwitchesNetwork TestingIT Monitoring Tools & ManagementSpanning-Tree (STP, RSTP)
Make enquiry
Project/Programme Management
Make enquiry
Information Security Management Systems (ISMS)Cyber Resilience ReviewCyber StrategyCyberCyber security standardsCloudComputer security procedures‎Policy and strategyMicrosoft WindowsAccess control‎
Make enquiry
Network SupportBGPCyber security standardsCiscoDNSIPSecNetwork ImplementationIT Monitoring Tools & ManagementFirewall PoliciesNetwork Security
Make enquiry
Remote Access / VPNVisual Basic .NET Distributed ComputingDatabase AdminstrationMicrosoft Visual StudioHTMLSAPMicrosoft SQL Server MSSQLPrometheusIT Monitoring Tools & Management
Palo Alto NetworksJuniper Networks SRXF5 ViprionCheck Point R77F5 LTMF5 GTMBlue Coat ProxySGDDoS PreventionData CentreCisco Nexus Series
Make enquiry
Risk AssessmentCompliance and AuditISO/IEC 27002ISO 27001Cyber security standardsInformation SecurityKali LinuxProject ManagementData security‎Cyber Strategy
Make enquiry
Network DesignNetwork DeploymentPre-Sales / Post-SalesVPNFirewall PoliciesMPLSNetwork SecurityBGPOSPFWireless
Make enquiry
BYODAAARedHat Enterprise Linux 6.xDebian LinuxCisco FirePOWERCisco Firepower Threat Defence (FTD)Cisco ISECisco WirelessCampus LAN (Large)Network Implementation
Make enquiry
Make enquiry
Planning & SchedulingCampus LAN (Large)Network SecurityData NetworksSupplier ManagementChange ManagementCiscoVMwareStakeholder ManagementBudget Management
Make enquiry
Make enquiry
Security ArchitectureApplication SecurityBusiness Process ImprovementsIncident Handling & AnalysisBusiness AnalysisIdentity and Access ManagementVMwareWAN (Nationwide)MicrosoftIPSec
IT Monitoring Tools & ManagementNetwork DesignNetwork TestingContract NegotiationMPLSProject ReportingVendor ManagementStakeholder ManagementEscalation ManagementNetwork Deployment