Browse Skills
1078+ expert skills across 5 domains. Scored on 6 quality dimensions.
Identity Governance Architect
GoldDesigns comprehensive identity governance and administration (IGA) strategies including identity lifecycle management, privileged access management, automated provisioning/deprovisioning, access reviews, and separation of duties enforcement.
SOC Automation Playbook Designer
GoldDesigns automated security operations playbooks for SOC teams — transforming manual triage, investigation, and response workflows into orchestrated SOAR playbooks with enrichment, decision logic, and compliance-aware containment actions.
OAuth Hardening Specialist
GoldSystematically audit and fortify OAuth 2.0 and OpenID Connect implementations against authorization code interception, redirect URI manipulation, token leakage, and scope escalation attacks using RFC-backed security best practices.
Vulnerability Management Strategist
GoldDesigns vulnerability management programs with CVE tracking, risk-based prioritization using CVSS and SSVC, patching strategies, scanner deployment, and remediation SLA frameworks that balance security urgency with operational stability.
Zero Trust Access Patterns
GoldDesign and implement zero trust architecture patterns including identity-centric access, microsegmentation, continuous verification, and least-privilege enforcement across cloud and hybrid environments.
Dependency Security Auditor
GoldAudits software dependencies for vulnerabilities, license risks, and supply chain threats using SCA tools, CVE triage, SBOM generation, and SLSA compliance.
Pseudonymisation Patterns Expert
GoldDesign and implement GDPR-compliant pseudonymisation systems using tokenization, encryption, hashing, and data masking patterns with re-identification risk assessment.
Penetration Testing Guide
GoldGuides defensive penetration testing methodology including scope definition, vulnerability assessment, and remediation reporting. Follows PTES and OWASP Testing Guide frameworks with strict defensive-only guardrails.
Red Team Operations Advisor
GoldPlan and execute adversary simulation exercises using real-world TTPs to validate defensive controls and detection capabilities.
Cloud Security Posture Manager
GoldAssesses and remediates cloud security misconfigurations across AWS, GCP, and Azure using CIS benchmarks. Designs automated CSPM workflows, drift detection, and compliance-as-code guardrails for multi-cloud environments.
Web Application Firewall Architect
GoldDesigns and tunes WAF configurations including OWASP CRS rules, anomaly scoring, rate limiting, and bot detection. Guides graduated enforcement from detection mode to blocking with systematic false positive tuning.
Zero Trust Network Designer
GoldDesigns zero trust architectures based on NIST SP 800-207 and BeyondCorp principles. Covers identity-based access, micro-segmentation, software-defined perimeters, and migration strategies from perimeter-based security.
Secrets Management Advisor
GoldGuides secure secrets lifecycle management including storage, rotation, access control, and CI/CD integration using Vault, cloud KMS, and zero-trust patterns.
Security Awareness Trainer
GoldDesigns security awareness programs including phishing simulations, training curricula, social engineering awareness campaigns, and security culture metrics. Builds measurable programs that change behavior, not just check compliance boxes.
Data Loss Prevention Strategist
GoldDesign comprehensive DLP strategies to prevent unauthorized data exfiltration across endpoints, networks, and cloud services.
IoT Security Specialist
GoldSecure IoT ecosystems from device to cloud, addressing firmware, communication, authentication, and lifecycle security challenges.
Threat Modeling Advisor
GoldConducts structured threat modeling for software systems using STRIDE, attack trees, and risk matrices to identify threats and produce prioritized mitigation strategies.
Bug Bounty Program Manager
GoldDesign and manage effective bug bounty programs that attract quality researchers and efficiently triage vulnerabilities.
Security Code Reviewer
GoldPerforms security-focused code reviews identifying vulnerabilities, misconfigurations, and insecure patterns across OWASP Top 10 categories with actionable fix recommendations.