Browse Skills

1078+ expert skills across 5 domains. Scored on 6 quality dimensions.

Cryptography Implementation Advisor

Gold
84.2Security

Advises on cryptographic implementation including encryption at rest/in transit, key management (KMS/HSM), TLS configuration, hashing algorithms, digital signatures, and post-quantum readiness. Focuses on correct usage of proven primitives rather than custom cryptography.

cryptographyencryptionkey-management

Digital Forensics Guide

Gold
84.2Security

Provides expert guidance on digital forensics methodology including evidence preservation, chain of custody, log analysis, memory forensics, disk forensics, and forensic reporting — strictly defensive and investigative in nature.

digital-forensicsdfirincident-response

Privileged Access Controls Specialist

Gold
84.0Security

Design and implement privileged access management (PAM) systems including credential vaulting, just-in-time access, session management, and compliance-ready access governance for enterprise and cloud environments.

pamprivileged-accessiam

Bot & Fraud Mitigation Specialist

Gold
84.0Security

Design and implement comprehensive bot detection, credential stuffing defense, and fraud prevention systems that balance security with user experience across web applications and APIs.

bot-detectionfraud-preventioncredential-stuffing

SOC Operations Designer

Gold
84.0Security

Designs Security Operations Center architectures including SIEM deployment, alert triage workflows, detection engineering rules, threat hunting programs, SOAR playbooks, and analyst tier structures optimized for detection efficacy and analyst efficiency.

socsecurity-operationssiem

Compliance as Code Architect

Gold
84.0Security

Expert compliance-as-code advisor that helps organizations automate regulatory compliance using policy-as-code frameworks like OPA/Rego and HashiCorp Sentinel, implementing automated CIS benchmark scanning, SOC 2 evidence collection, and continuous compliance monitoring.

compliance-as-codepolicy-as-codeopa

Security Metrics Dashboard Designer

Gold
84.0Security

Designs comprehensive security metrics programs with KPIs, KRIs, dashboards, and reporting frameworks that translate security posture into actionable insights for technical teams, management, and board-level stakeholders.

security-metricskpikri

Consent Logging Architect

Gold
83.8Security

Designs tamper-evident consent logging architectures that provide audit-complete proof of user consent across GDPR, CCPA/CPRA, and ePrivacy regulations, with immutable event sourcing and real-time consent signal propagation.

consent-managementgdprccpa

Identity Governance Architect

Gold
83.8Security

Designs comprehensive identity governance and administration (IGA) strategies including identity lifecycle management, privileged access management, automated provisioning/deprovisioning, access reviews, and separation of duties enforcement.

identity-governanceigaprivileged-access-management

SOC Automation Playbook Designer

Gold
83.7Security

Designs automated security operations playbooks for SOC teams — transforming manual triage, investigation, and response workflows into orchestrated SOAR playbooks with enrichment, decision logic, and compliance-aware containment actions.

soc-automationsoar-playbooksincident-response

Vulnerability Management Strategist

Gold
83.5Security

Designs vulnerability management programs with CVE tracking, risk-based prioritization using CVSS and SSVC, patching strategies, scanner deployment, and remediation SLA frameworks that balance security urgency with operational stability.

vulnerability-managementcvssssvc

OAuth Hardening Specialist

Gold
83.5Security

Systematically audit and fortify OAuth 2.0 and OpenID Connect implementations against authorization code interception, redirect URI manipulation, token leakage, and scope escalation attacks using RFC-backed security best practices.

oauthoidcauthentication

Dependency Security Auditor

Gold
83.5Security

Audits software dependencies for vulnerabilities, license risks, and supply chain threats using SCA tools, CVE triage, SBOM generation, and SLSA compliance.

dependency-securitysupply-chainsca

Pseudonymisation Patterns Expert

Gold
83.5Security

Design and implement GDPR-compliant pseudonymisation systems using tokenization, encryption, hashing, and data masking patterns with re-identification risk assessment.

pseudonymisationdata-privacygdpr

Zero Trust Access Patterns

Gold
83.5Security

Design and implement zero trust architecture patterns including identity-centric access, microsegmentation, continuous verification, and least-privilege enforcement across cloud and hybrid environments.

zero-trustidentitymicrosegmentation

Penetration Testing Guide

Gold
83.4Security

Guides defensive penetration testing methodology including scope definition, vulnerability assessment, and remediation reporting. Follows PTES and OWASP Testing Guide frameworks with strict defensive-only guardrails.

penetration-testingpentestowasp

Cloud Security Posture Manager

Gold
83.3Security

Assesses and remediates cloud security misconfigurations across AWS, GCP, and Azure using CIS benchmarks. Designs automated CSPM workflows, drift detection, and compliance-as-code guardrails for multi-cloud environments.

cspmcloud-securitycis-benchmarks

Red Team Operations Advisor

Gold
83.3Security

Plan and execute adversary simulation exercises using real-world TTPs to validate defensive controls and detection capabilities.

red-teamadversary-simulationmitre-attack

Web Application Firewall Architect

Gold
83.2Security

Designs and tunes WAF configurations including OWASP CRS rules, anomaly scoring, rate limiting, and bot detection. Guides graduated enforcement from detection mode to blocking with systematic false positive tuning.

wafweb-application-firewallmodsecurity

Zero Trust Network Designer

Gold
83.1Security

Designs zero trust architectures based on NIST SP 800-207 and BeyondCorp principles. Covers identity-based access, micro-segmentation, software-defined perimeters, and migration strategies from perimeter-based security.

zero-trustbeyondcorpmicro-segmentation

Secrets Management Advisor

Gold
83.0Security

Guides secure secrets lifecycle management including storage, rotation, access control, and CI/CD integration using Vault, cloud KMS, and zero-trust patterns.

secrets-managementvaultaws-secrets-manager

Security Awareness Trainer

Gold
82.8Security

Designs security awareness programs including phishing simulations, training curricula, social engineering awareness campaigns, and security culture metrics. Builds measurable programs that change behavior, not just check compliance boxes.

security-awarenessphishing-simulationsecurity-training

Data Loss Prevention Strategist

Gold
82.8Security

Design comprehensive DLP strategies to prevent unauthorized data exfiltration across endpoints, networks, and cloud services.

dlpdata-protectioninsider-threat

IoT Security Specialist

Gold
82.7Security

Secure IoT ecosystems from device to cloud, addressing firmware, communication, authentication, and lifecycle security challenges.

iot-securityembedded-securityfirmware
PreviousPage 2 of 3Next