Database
Browse 5,303 skills across 372 packs and 37 categories
Surgical Nursing
55Lexperienced registered nurse with extensive perioperative nursing expertise spanning pre-operative assessment clinics, intraoperative circulating and scrub roles, post-anesthesia care units, and surgi.
Wound Care
56Lexperienced registered nurse who holds wound care certification (WCC) and has spent over a decade managing complex wounds across acute care, long-term care, and home health settings. You have extensiv.
HubSpot CRM API
316LHubSpot CMS Hub
260LHubSpot Custom Objects
202LHubSpot Integrations
213LHubSpot Marketing Hub
204LHubSpot Operations Hub
200LHubSpot Reporting & Analytics
200LHubSpot Workflows
204LBusiness Email Compromise Simulation
55LSimulate BEC attacks to test financial controls, authorization procedures, and executive impersonation defenses
Credential Harvesting for Authorized Engagements
57LBuild authorized credential harvesting pages for phishing simulations using GoPhish, Evilginx, and transparent proxies
Deepfake and Synthetic Media Awareness
55LBuild organizational awareness and verification procedures against deepfake voice, video, and AI-generated content threats
Helpdesk Social Engineering Testing
55LTest helpdesk and IT support social engineering resilience through authorized identity verification bypass assessments
Insider Threat Assessment
55LAssess insider threat program maturity through gap analysis of behavioral indicators, DLP, and access controls
Red Team Social Engineering
58LExecute full-scope red team social engineering campaigns combining email, phone, physical, and technical vectors
Social Media Reconnaissance
55LConduct social media OSINT for authorized engagements to map organizational exposure and employee data leakage
Supply Chain Social Engineering Assessment
55LAssess supply chain and third-party social engineering risks through vendor impersonation and trusted relationship abuse testing
Active Directory Security
157LActive Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments
IAM Policy Review
164LIAM policy analysis and least privilege assessment for authorized security assessments
MFA Coverage Assessment
155LMFA coverage assessment and bypass risk detection for authorized security assessments
Privilege Escalation Detection
168LPrivilege escalation path detection in cloud and enterprise environments for authorized assessments
Role Trust Boundaries
157LRole trust boundaries, cross-account access, and federation security review for authorized assessments
Secret Management
163LSecret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments
Attribution Support
48LAlias clustering, language patterns, infrastructure reuse, and confidence-rated attribution
Decentralized Threat Research
46LP2P abuse monitoring, wallet-linked fraud, smart contract risk, and cross-platform correlation
Domain and Infrastructure Correlation
47LCorrelate domains, certificates, IPs, and ASNs across adversary campaigns
Incident Enrichment
48LTransform raw security alerts into actor hypotheses, motives, next steps, and containment guidance
OSINT Fusion
49LMerge public web, breach data, passive DNS, social graph, and code repository intelligence
Endpoint Visibility Gap Analysis
130LEndpoint visibility gap analysis, rogue device detection, and EDR coverage assessment for internal networks
Lateral Movement Path Analysis
118LLateral movement path analysis, credential relay, and pivot detection for authorized internal network assessments
Legacy Protocol Risk Assessment
121LLegacy protocol risk assessment for SMBv1, LLMNR, NetBIOS, Telnet, and other deprecated services
Network Segmentation Validation
134LNetwork segmentation validation, VLAN hopping, firewall rule review, and micro-segmentation testing
Trust Relationship Review
111LDomain trust enumeration, shared service abuse, and cross-boundary attack path analysis for authorized assessments
Credential Leak Detection
46LDetect credential leaks, stealer-log references, and breach monitoring for organizational accounts
Data Exposure Analysis
46LDetect customer data mentions, PII exposure, and data dump analysis for breach assessment
Executive Exposure Review
48LAssess doxxing risk, credential reuse, and public digital footprint for high-risk individuals
Source Code Exposure Detection
47LDetect source code exposure, config dumps, and secret leaks in public repositories
Supply Chain Monitoring
48LMonitor for typosquat packages, dependency abuse, malicious updates, and fake repositories
Appellate Practice
64LHandle appeals in federal and state courts, covering preservation of error, briefing strategy, standards of review, oral argument preparation, petitions for rehearing and en banc consideration, and certiorari practice.
Arbitration
64LNavigate domestic arbitration proceedings under AAA, JAMS, and other provider rules, covering clause drafting, arbitrator selection, hearing procedures, and award enforcement or vacatur.
Civil Litigation
65LGuide the full lifecycle of civil litigation from complaint through trial, covering pleading strategy, discovery management, dispositive motions, and trial preparation in federal and state courts.
Class Action
63LManage class action litigation from pre-filing investigation through settlement or trial, covering class certification, notice programs, settlement approval, fee petitions, and opt-out management under Rule 23.
Ediscovery
65LManage the full electronic discovery lifecycle including litigation holds, data preservation, collection, processing, review, production, and advanced analytics such as technology-assisted review and predictive coding.
Expert Witnesses
65LManage expert witness engagements from retention through trial testimony, covering selection criteria, Daubert and Frye challenges, report preparation, deposition defense, and effective direct and cross-examination of experts.
Injunctive Relief
66LPursue and defend against temporary restraining orders, preliminary injunctions, and permanent injunctions, covering irreparable harm analysis, likelihood of success, balance of equities, bond requirements, and enforcement mechanisms.
Insurance Coverage
65LAnalyze insurance coverage disputes involving commercial general liability, directors and officers, professional liability, and specialty policies, covering policy interpretation, tender and notice obligations, reservation of rights, and coverage litigation strategy.
International Arbitration
67LNavigate international commercial and investment arbitration under ICC, ICSID, UNCITRAL, and other institutional rules, covering arbitration agreement drafting, tribunal constitution, procedural management, award enforcement under the New York Convention, and investment treaty claims.
Mediation
65LPrepare for and participate effectively in mediation proceedings, covering pre-mediation strategy, opening statements, caucus negotiation techniques, impasse-breaking methods, and drafting enforceable settlement agreements.
Art Collecting
63Lart advisor and former gallery director with over twenty years of experience in the contemporary and modern art markets. You have represented emerging artists, managed secondary market transactions fo.
Bespoke Tailoring
61Lbespoke tailoring consultant and former atelier manager who has spent over fifteen years in the world of custom clothing. You have worked on Savile Row in London, in Neapolitan workshops, and with tai.
Cigar Appreciation
65Lcigar specialist with over fifteen years of experience working in premium tobacconists, private clubs, and luxury hospitality. You have visited tobacco farms in Cuba's Vuelta Abajo, the Connecticut Ri.
Classic Car Collecting
63Lclassic car specialist who has spent over twenty years buying, selling, restoring, and advising on collector automobiles. You have managed private collections ranging from pre-war European sports cars.
Fine Dining Etiquette
62Lauthority on fine dining etiquette with decades of experience working in Michelin-starred restaurants and luxury hotel dining rooms across Europe, North America, and Asia. You have trained front-of-ho.
Luxury Travel
62Lluxury travel advisor and former hospitality executive who has spent over two decades in the premium travel industry. You have managed guest relations at palace-grade hotels, designed bespoke itinerar.
Luxury Watch Collecting
63Lseasoned watch collector and former horological consultant who has spent over twenty years buying, selling, and advising on fine timepieces. You have handled pieces from every major manufacture, atten.
Whiskey Appreciation
64Lwhiskey specialist who has spent nearly two decades immersed in the world of aged spirits. You have worked as a bar director at establishments with collections exceeding a thousand bottles, visited di.
Wine Connoisseur
65LMaster Sommelier and wine educator who has spent over twenty years working in top restaurants, managing extensive cellars, sourcing wines directly from producers across every major region, and teachin.
Yacht Lifestyle
64Lyachting specialist and former superyacht chief stewardess who transitioned into yacht brokerage and charter management over a career spanning eighteen years. You have served aboard vessels ranging fr.