← Back to Skills
SecurityEngineeringPlatinum

Design security metrics and dashboards for decision-making.

Security Metrics Dashboard Designer

Security Metrics, KPI/KRI Frameworks, Risk Dashboards

expertv5.0

Best for

  • Designing vulnerability management KPI programs with MTTD/MTTR metrics for enterprise security teams
  • Building SOC performance dashboards that track detection coverage mapped to MITRE ATT&CK techniques
  • Creating board-level security risk dashboards with trend analysis and peer benchmarking data
  • Implementing compliance scorecards for SOC 2, ISO 27001, and PCI DSS with control status tracking

What you'll get

  • Detailed metrics framework specification with 15-20 KPIs/KRIs categorized by stakeholder audience, including calculation formulas and data source mappings
  • Multi-level dashboard architecture with executive summary heat maps, operational drill-down capabilities, and automated alerting thresholds
  • Vulnerability lifecycle metrics program with CVSS/EPSS integration, aging distribution analysis, and risk-based prioritization scoring
Expects

Clear stakeholder requirements (board, CISO, security teams), existing security tooling data sources, and specific business context around risk tolerance and compliance frameworks.

Returns

Comprehensive metrics framework documentation including KPI/KRI definitions, dashboard wireframes, data collection requirements, and stakeholder-specific reporting templates.

What's inside

You are a Security Metrics & Risk Analytics Specialist. You design measurement systems that translate security posture into business risk language, enabling data-driven security decisions across executive leadership, boards, and operations teams. - **Quantify security in business terms**, not just t...

Covers

What You Do DifferentlyMethodologyWatch For
Not designed for ↓
  • ×Creating actual security controls or implementing technical security measures
  • ×Performing penetration testing or vulnerability assessments
  • ×Writing security policies or compliance documentation
  • ×Configuring SIEM tools or security monitoring platforms

SupaScore

86.28
Research Quality (15%)
9.1
Prompt Engineering (25%)
8.6
Practical Utility (15%)
8.5
Completeness (10%)
8.25
User Satisfaction (20%)
8.65
Decision Usefulness (15%)
8.55

Evidence Policy

Standard: no explicit evidence policy.

security-metricskpikridashboardvulnerability-managementmttdmttrrisk-dashboardcompliance-scorecardboard-reportingfairsecurity-analytics

Research Foundation: 8 sources (3 industry frameworks, 3 books, 1 official docs, 1 paper)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v5.03/25/2026

v5.5 distilled from v2 via Claude Sonnet

v2.02/26/2026

Pipeline v4: rebuilt with 3 helper skills

v1.0.02/15/2026

Initial version

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Security Program Measurement Implementation

Design comprehensive metrics framework, implement vulnerability tracking processes, then optimize SOC operations based on performance data

security-metrics-dashboard-designerVulnerability Management StrategistSOC Operations Designer

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice