Browse Skills

1078+ expert skills across 5 domains. Scored on 6 quality dimensions.

Identity Governance Architect

Gold
83.8Security

Designs comprehensive identity governance and administration (IGA) strategies including identity lifecycle management, privileged access management, automated provisioning/deprovisioning, access reviews, and separation of duties enforcement.

identity-governanceigaprivileged-access-management

SOC Automation Playbook Designer

Gold
83.7Security

Designs automated security operations playbooks for SOC teams — transforming manual triage, investigation, and response workflows into orchestrated SOAR playbooks with enrichment, decision logic, and compliance-aware containment actions.

soc-automationsoar-playbooksincident-response

OAuth Hardening Specialist

Gold
83.5Security

Systematically audit and fortify OAuth 2.0 and OpenID Connect implementations against authorization code interception, redirect URI manipulation, token leakage, and scope escalation attacks using RFC-backed security best practices.

oauthoidcauthentication

Vulnerability Management Strategist

Gold
83.5Security

Designs vulnerability management programs with CVE tracking, risk-based prioritization using CVSS and SSVC, patching strategies, scanner deployment, and remediation SLA frameworks that balance security urgency with operational stability.

vulnerability-managementcvssssvc

Zero Trust Access Patterns

Gold
83.5Security

Design and implement zero trust architecture patterns including identity-centric access, microsegmentation, continuous verification, and least-privilege enforcement across cloud and hybrid environments.

zero-trustidentitymicrosegmentation

Dependency Security Auditor

Gold
83.5Security

Audits software dependencies for vulnerabilities, license risks, and supply chain threats using SCA tools, CVE triage, SBOM generation, and SLSA compliance.

dependency-securitysupply-chainsca

Pseudonymisation Patterns Expert

Gold
83.5Security

Design and implement GDPR-compliant pseudonymisation systems using tokenization, encryption, hashing, and data masking patterns with re-identification risk assessment.

pseudonymisationdata-privacygdpr

Penetration Testing Guide

Gold
83.4Security

Guides defensive penetration testing methodology including scope definition, vulnerability assessment, and remediation reporting. Follows PTES and OWASP Testing Guide frameworks with strict defensive-only guardrails.

penetration-testingpentestowasp

Red Team Operations Advisor

Gold
83.3Security

Plan and execute adversary simulation exercises using real-world TTPs to validate defensive controls and detection capabilities.

red-teamadversary-simulationmitre-attack

Cloud Security Posture Manager

Gold
83.3Security

Assesses and remediates cloud security misconfigurations across AWS, GCP, and Azure using CIS benchmarks. Designs automated CSPM workflows, drift detection, and compliance-as-code guardrails for multi-cloud environments.

cspmcloud-securitycis-benchmarks

Web Application Firewall Architect

Gold
83.2Security

Designs and tunes WAF configurations including OWASP CRS rules, anomaly scoring, rate limiting, and bot detection. Guides graduated enforcement from detection mode to blocking with systematic false positive tuning.

wafweb-application-firewallmodsecurity

Zero Trust Network Designer

Gold
83.1Security

Designs zero trust architectures based on NIST SP 800-207 and BeyondCorp principles. Covers identity-based access, micro-segmentation, software-defined perimeters, and migration strategies from perimeter-based security.

zero-trustbeyondcorpmicro-segmentation

Secrets Management Advisor

Gold
83.0Security

Guides secure secrets lifecycle management including storage, rotation, access control, and CI/CD integration using Vault, cloud KMS, and zero-trust patterns.

secrets-managementvaultaws-secrets-manager

Security Awareness Trainer

Gold
82.8Security

Designs security awareness programs including phishing simulations, training curricula, social engineering awareness campaigns, and security culture metrics. Builds measurable programs that change behavior, not just check compliance boxes.

security-awarenessphishing-simulationsecurity-training

Data Loss Prevention Strategist

Gold
82.8Security

Design comprehensive DLP strategies to prevent unauthorized data exfiltration across endpoints, networks, and cloud services.

dlpdata-protectioninsider-threat

IoT Security Specialist

Gold
82.7Security

Secure IoT ecosystems from device to cloud, addressing firmware, communication, authentication, and lifecycle security challenges.

iot-securityembedded-securityfirmware

Threat Modeling Advisor

Gold
82.0Security

Conducts structured threat modeling for software systems using STRIDE, attack trees, and risk matrices to identify threats and produce prioritized mitigation strategies.

securitythreat-modelingstride

Bug Bounty Program Manager

Gold
81.9Security

Design and manage effective bug bounty programs that attract quality researchers and efficiently triage vulnerabilities.

bug-bountyvulnerability-disclosurehackerone

Security Code Reviewer

Gold
81.0Security

Performs security-focused code reviews identifying vulnerabilities, misconfigurations, and insecure patterns across OWASP Top 10 categories with actionable fix recommendations.

securitycode-reviewowasp
PreviousPage 2 of 2