Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Make enquiry
Security InvestigationsSecurity Operations Centre (SOC)Threat Intelligence and ModellingISO 27001Cyber EssentialsCommon Vulnerability Scoring System (CVSS)Vulnerability ManagementThreat & Vulnerability ManagementInformation privacy‎Information Security
Vulnerability ManagementFirewallsCyber EssentialsCyber StrategyPenetration Testing (Network)Risk ManagementPCI-DSSISO 27001Network Security
Make enquiry
Project ManagementService Delivery ManagementService Transition
Make enquiry
eBGPQualysFortinetChange ApprovalPalo Alto NetworksMicrosoftCisco LAN Access SwitchesNetwork TestingIT Monitoring Tools & ManagementSpanning-Tree (STP, RSTP)
Spring (Java)MavenOracleMongoDBDockerLinuxJavaScriptSOAPRESTNetwork Design
Make enquiry
Project/Programme ManagementContact CentreChange ManagementTeam Management
Make enquiry
GrafanaGradlePrometheusMongoDBJenkinsContinuous Integration / Deployment (CI/CD)Security transformation programmesApache CassandraProjectsPerformance Testing
Make enquiry
Project managerConstruction management
Technical projectsIT InfrastructureIT UpgradesIT MigrationsForecasting of Costs & RevenueContract ManagementData NetworksData CentreService ProviderBudget Management
Make enquiry
SalesBusiness DevelopmentProject ReportingTeam ManagementStakeholder Management
Make enquiry
Supervision
Make enquiry
ISO 27001NISTIT Risk Management‎ITSECCyber Resilience ReviewCyber SecurityCyber security standardsCyber Strategy
Make enquiry
Strategic Design and Business PlanningService DesignEnterprise ArchitectureBusiness Process
Make enquiry
Network SupportTechnical projectsStakeholder ManagementProject ReportingChange Management
Make enquiry
Project DeliveryIT MigrationsNetwork DeploymentData CentreData NetworksNetwork Implementation
Make enquiry
Operations and security managementBudget ManagementProject/Programme ScopingManaged ServiceProject DeliveryNetwork ImplementationNetwork Security
Make enquiry
LeadershipManagement and leadershipCyber Resilience ReviewCyber Strategy
IT Monitoring Tools & ManagementNetwork DesignNetwork TestingContract NegotiationMPLSProject ReportingVendor ManagementStakeholder ManagementEscalation ManagementNetwork Deployment
Make enquiry
Planning & SchedulingBusiness AnalysisTeam ManagementStakeholder ManagementIT Monitoring Tools & ManagementNetwork SecurityIPSec
Make enquiry
Business Analysis
Make enquiry
Bid / Proposal ManagementChange ManagementStakeholder Management
Make enquiry
Team ManagementStakeholder ManagementPlanning & SchedulingChange ManagementBusiness Analysis
Make enquiry
Customer ServicesCustomer SuccessContact Centre
Cisco Branch Routers / ISRConfiguration ApprovalVPCIP TelephonyHPChange ApprovalWAN (Continental)Team ManagementSpanning-Tree (STP, RSTP)L2 VPN
Make enquiry
SecurityMicrosoft Azure ADMicrosoft AzureDatabase DesignAzure Cloud
Make enquiry
Business AnalysisAccount ManagementPre-Sales / Post-SalesProposal WritingBid / Proposal ManagementCustomer Relationship ManagementBusiness and Management ConsultancyPre-SalesSalesMicrosoft Sharepoint Online
Make enquiry
Team ManagementStakeholder ManagementProject/Programme ManagementPre & Post SalesPlanning & SchedulingIT InfrastructureData NetworksCloud MigrationsChange ManagementApplication Development
Make enquiry
Management and leadershipStrategyTechnical Risk AdvisorData ProtectionData protectionPrivileged identity managementIdentity and Access ManagementIdentity and Access ManagementThird Party Security AuditComputer security exploits‎