Find a consultant

Search matches:
Hubbado skills strength:
Strong
Medium
Low
How strong is the consultant in each area?
Strong
Medium
Low
How is strength calculated?
  • years of experience
  • recency of use
Business projectsPlanning & SchedulingData Centre MigrationsOffice Relocation and UpgradesIT MigrationsTrainingResource ManagementStakeholder ManagementTeam ManagementProject Reporting
Not working
Network ImplementationIPSecIT Monitoring Tools & ManagementNATNetwork SecurityNetwork TestingOSPFNetwork SupportFirewall PoliciesDNS
Not working
Project ReportingStakeholder ManagementTeam ManagementPlanning & SchedulingProcess ImprovementRisk ManagementTrainingMentoringTechnical projectsIT Upgrades
IBM MQMySQLIBM DB2Akka (toolkit)Amazon Web ServicesAWS S3Amazon (AWS) EC2AWS LambdaAWS SNSAWS SQS
Not working
ArchitectureMicrosoft Hyper-VMicrosoft Windows ServerMicrosoft Windows 10Windows EngineeringWindows Group Policy ManagementMicrosoft Azure ADMicrosoft AzureMicrosoft Office 365Microsoft SCCM
Not working
Threat Intelligence and ModellingRisk AssessmentIncident ResponseIncident Management
Not working
Network DesignFirewall PoliciesData NetworksData CentreNetwork SecurityBGPLogRhythmAmazon AWSDarktraceCisco ACS
ConsultancyISO 27001Information SecurityThird Party Security Audit3rd-Party Security RiskIT SecuritySecurity transformation programmesSecurity Operations Centre (SOC)Network SecurityTraining and Awareness
Not working
Not working
Team ManagementStakeholder ManagementProject ReportingChange Management
Technical projectsCiscoPRINCE2Budget ManagementIT MigrationsData NetworksData CentreIT InfrastructureIT SecurityCisco Catalyst 4500 Series
Not working
IT Monitoring Tools & ManagementNetwork SupportData CentreDMVPNIPv6OSPFEIGRPBGPFirewall PoliciesNAT
Not working
Data NetworksCiscoNetwork DesignNetwork ImplementationCampus LAN (Large)Cisco Catalyst 6500 SeriesCisco Nexus 7000 SeriesCisco Nexus 5000 SeriesCisco ASAFirewall Policies
Access control‎Architecture and DesignSSLIntrusion Detection and PreventionNetwork SecurityInfrastructure SecuritySplunkRisk Assessment and AuditMalware DetectionFirewalls
Not working
Not working
WiresharkBGPIPv4DNSSSLVPNTCP/IPIPSecIntrusion Detection and PreventionCloud security
Not working
Prince 2Project ManagementProject DeliveryScrum MasterTeam Management
Not working
Vulnerability ManagementSecurity ArchitectureNetwork Security
Process CreationProcess ManagementModels & AnalyticsAgileAnti Money LaunderingSoftware design & developmentKYC CDD OnboardingChange DeliveryRegulatory ComplianceMiFiD
Not working
Data Centre
Not working
Technology AuditTechnology ConsultingTechnology riskCyber SecurityTeam ManagementStakeholder ManagementProject ManagementIT Monitoring Tools & ManagementChange ManagementBudget Management
Not working
Process ManagementStakeholder ManagementTeam ManagementProcess ImprovementTrainingMentoringIT SecurityPlanning & SchedulingBusiness projectsSales
Not working
Network SupportNetwork SecurityNetwork ImplementationNetwork Deployment
Not working
Cyber EssentialsInformation Systems AuditPCI AuditThird Party Security AuditIT Monitoring Tools & Management
Team ManagementBudget ManagementForecasting of Costs & RevenueRisk ManagementProject ReportingIT InfrastructureIT MigrationsTechnical projectsStakeholder ManagementData Centre Migrations
Data CentreVoice / TelephonyMPLSNetwork DesignNetwork ImplementationIT InfrastructureF5Juniper NetworksCheck PointNetwork Support
Planning & SchedulingTeam ManagementService Delivery ManagementOrganisational TransformationManagement and leadershipBudget ManagementTechnical projectsIT LifecycleIT UpgradesIT Infrastructure
Not working
RailGroundworks
Not working
JavaScriptCSSHTMLReactAngular 4ExtJSAngularJsObjective-CjQueryPHPUnit