Skill Matrix
Skill Matrix
Infrastructure Assessment
Fecha Standard Scanning VLAN Hopping/Tagging Active Firewall Testing
DD/MM/AA 1 1 1
sment OS Build Reviews
IDS/IPS Testing VoIP Assessment Windows Linux Solaris BSD MAC OSX
1 1 1 1 1 1 1
Build Reviews Embedded Systems
HP/UX AIX VMWare/ESXi Mainframes IBM Z/OS AS/400 Wireless
1 1 1 1 1 1 1
ystems Firewall Configuration Review
Bluetooth GSM/3G/4G Cisco PIX/ASA Checkpoint Juniper/Netscreen Palo Alto
1 1 1 1 1 1
nfiguration Review Router & Switch Configuration Review
McAfee Enterprise Firewall pfSense *Nix/*BSD Cisco IOS
1 1 1 1
Router & Switch Configuration Review Database Assessment
Software-Defined/Virtual Networks Microsoft SQL Server Oracle MySQL DB2
1 1 1 1 1
se Assessment
Informix Postgres SQLite NoSQL Thin Client (browser-based apps) Silverlight
1 1 1 1 1 1
Web Application Assessment
Flash RMI/CORBA/Applet ActiveX Web Services/API Testing JavaScript Frameworks
1 1 1 1 1
Other Assessments
HTML5 Cloud Security - Microsoft Azure Cloud Security - Amazon AWS
1 1 1
Other Assessments
Thick Client Assessment Hadoop Pin Entry Device (PED)
1 1 1
Source Code Review & Software Development
Secure Development Lifecycle (SDLC) JavaScript Java C#.NET C/C++ Swift
3 3 3 3 3 3
& Software Development
Perl Ruby PHP Python Visual Basic COBOL Bash
3 3 3 3 3 3 3
Enterprise Software & Framework Assessment
Active Directory Microsoft SharePoint SAP SIEBEL WebLogic
3 3 3 3 3
Software & Framework Assessment Mobile Device Managem
Message Queueing (MQ) Oracle E-Business Suite Tivoli Access Manager Airwatch
3 3 3 3
Mobile Device Management (MDM) Assessment
MobileIron Blackberry Enterprise Server (BES) Decompiling and Static Analysis
3 3 3
Reverse Engineering & Static Analysis
Exploit Writing Dynamic Binary Analysis (Debugging) Malware Analysis
3 3 3
ing & Static Analysis
Digital Rights Management (DRM) x86 Assembly ARM Assembly Exploit Analysis
3 3 3 3
Mobile Device Assessments
Blackberry Windows CE iDevice/iOS - iPhone; iPad etc. Android Windows Mobile
3 3 3 3 3
Mobile Application Assessments
Windows Mobile Apps Apple iOS Apps Android Apps Database Forensics
3 3 3 3
Host Analysis - Windows Host Analysis - Linux eDiscovery Forensic Acquisition - PC
3 3 3 3
Forensics and IR
Forensic Acquisition - Mobile Device Forensic Acquisition - Cloud Host Analysis - MAC
3 3 3
Host Analysis - IOS Host Analysis - Android Memory Analysis Database Analysis
3 3 3 3
Incident Management Security Design System Hardening Guides and Implementation
3 3 3
Network Architecture Reviews
Cryptography Policy Creation & Review Development of Secure Coding Guidelines
3 3 3
Continuity and Disaster Recovery (DR) Active Directory and Group Policy ISO 27001
3 3 3
Social Engineering & Red Teaming
Social Engineering Running Phishing Campaigns Red Teaming OSINT Simulated APT
3 3 3 3 3
Consultancy Skills
Insider Threat Client Interaction Report Writing Scoping & Proposals
3 3 3 3
Consultancy Skills
Public Speaking (conferences etc.) Facilitating & Running Workshops
3 3
VHDL Development and Code Audit
Architecture and Design Hardware Teardown Firmware Reverse Engineering
3 3 3
Industrial Control Systems
OCD Features Architecture & Design Data Historians HMI SCADA SIS
3 3 3 3 3 3
Network Monitoring Signature Creation Intelligence Gathering
3 3 3
Compromise Assessments
Underground/Dark Web Research Social Media Research Threat Profiling
3 3 3
ompromise Assessments
Infrastructure Tracking Domain Assessments Secure Development Life Cycle
3 3 3
Threat Modelling Gap Analysis Containerization Docker
3 3 3 3
Security Archi
AWS Cloud Security Architecture Review Azure Cloud Security Architecture Review
1 1
Security Architecture
Office 365 Security Architecture Review Security Architecture Infrastructure Review
1 1
Cyber Security Review
Security Architecture Network Review Assurance CSR CIS Framework CSR NIST Framework
1 1 1 1
ty Review Business Continuity Consultancy
Incident Response Incident Response Policy/Plan Consultancy
1 1
Business Continuity Consultancy
Incident Response Playbook Consultancy Table Top Incident Response Consultancy
1 1
GDPR Briefing GDPR Health Check
1 1
Priva
GDPR Foundation TrainingData Protection Impact Assessment (DPIA) Security Training
1 1
Privacy
Executive Briefing End User Security AwareRole Based Security TrainiSecurity Transformation
1 1 1 1
Security TransformationISO 27001 Readiness Revi ISO 27001 Consultancy Security on Demand
1 1 1 1
Nivel
1
2
3
4
5