Skip to main content

Database

Browse 5,303 skills across 372 packs and 37 categories

Showing 121–180 of 441 skills
441 skills found in Uncategorized

Surgical Nursing

55L

experienced registered nurse with extensive perioperative nursing expertise spanning pre-operative assessment clinics, intraoperative circulating and scrub roles, post-anesthesia care units, and surgi.

UncategorizedHealthcare Nursing

Wound Care

56L

experienced registered nurse who holds wound care certification (WCC) and has spent over a decade managing complex wounds across acute care, long-term care, and home health settings. You have extensiv.

UncategorizedHealthcare Nursing

HubSpot CRM API

316L

UncategorizedHubspot

HubSpot CMS Hub

260L

UncategorizedHubspot

HubSpot Custom Objects

202L

UncategorizedHubspot

HubSpot Integrations

213L

UncategorizedHubspot

HubSpot Marketing Hub

204L

UncategorizedHubspot

HubSpot Operations Hub

200L

UncategorizedHubspot

HubSpot Reporting & Analytics

200L

UncategorizedHubspot

HubSpot Workflows

204L

UncategorizedHubspot

Business Email Compromise Simulation

55L

Simulate BEC attacks to test financial controls, authorization procedures, and executive impersonation defenses

UncategorizedHuman Factor Security

Credential Harvesting for Authorized Engagements

57L

Build authorized credential harvesting pages for phishing simulations using GoPhish, Evilginx, and transparent proxies

UncategorizedHuman Factor Security

Deepfake and Synthetic Media Awareness

55L

Build organizational awareness and verification procedures against deepfake voice, video, and AI-generated content threats

UncategorizedHuman Factor Security

Helpdesk Social Engineering Testing

55L

Test helpdesk and IT support social engineering resilience through authorized identity verification bypass assessments

UncategorizedHuman Factor Security

Insider Threat Assessment

55L

Assess insider threat program maturity through gap analysis of behavioral indicators, DLP, and access controls

UncategorizedHuman Factor Security

Red Team Social Engineering

58L

Execute full-scope red team social engineering campaigns combining email, phone, physical, and technical vectors

UncategorizedHuman Factor Security

Social Media Reconnaissance

55L

Conduct social media OSINT for authorized engagements to map organizational exposure and employee data leakage

UncategorizedHuman Factor Security

Supply Chain Social Engineering Assessment

55L

Assess supply chain and third-party social engineering risks through vendor impersonation and trusted relationship abuse testing

UncategorizedHuman Factor Security

Active Directory Security

157L

Active Directory trust review, Kerberos assessment, and delegation risk analysis for authorized assessments

UncategorizedIdentity Iam Agent

IAM Policy Review

164L

IAM policy analysis and least privilege assessment for authorized security assessments

UncategorizedIdentity Iam Agent

MFA Coverage Assessment

155L

MFA coverage assessment and bypass risk detection for authorized security assessments

UncategorizedIdentity Iam Agent

Privilege Escalation Detection

168L

Privilege escalation path detection in cloud and enterprise environments for authorized assessments

UncategorizedIdentity Iam Agent

Role Trust Boundaries

157L

Role trust boundaries, cross-account access, and federation security review for authorized assessments

UncategorizedIdentity Iam Agent

Secret Management

163L

Secret sprawl detection, key rotation assessment, and vault configuration review for authorized assessments

UncategorizedIdentity Iam Agent

Attribution Support

48L

Alias clustering, language patterns, infrastructure reuse, and confidence-rated attribution

UncategorizedInfrastructure Correlation

Decentralized Threat Research

46L

P2P abuse monitoring, wallet-linked fraud, smart contract risk, and cross-platform correlation

UncategorizedInfrastructure Correlation

Domain and Infrastructure Correlation

47L

Correlate domains, certificates, IPs, and ASNs across adversary campaigns

UncategorizedInfrastructure Correlation

Incident Enrichment

48L

Transform raw security alerts into actor hypotheses, motives, next steps, and containment guidance

UncategorizedInfrastructure Correlation

OSINT Fusion

49L

Merge public web, breach data, passive DNS, social graph, and code repository intelligence

UncategorizedInfrastructure Correlation

Endpoint Visibility Gap Analysis

130L

Endpoint visibility gap analysis, rogue device detection, and EDR coverage assessment for internal networks

UncategorizedInternal Network Agent

Lateral Movement Path Analysis

118L

Lateral movement path analysis, credential relay, and pivot detection for authorized internal network assessments

UncategorizedInternal Network Agent

Legacy Protocol Risk Assessment

121L

Legacy protocol risk assessment for SMBv1, LLMNR, NetBIOS, Telnet, and other deprecated services

UncategorizedInternal Network Agent

Network Segmentation Validation

134L

Network segmentation validation, VLAN hopping, firewall rule review, and micro-segmentation testing

UncategorizedInternal Network Agent

Trust Relationship Review

111L

Domain trust enumeration, shared service abuse, and cross-boundary attack path analysis for authorized assessments

UncategorizedInternal Network Agent

Credential Leak Detection

46L

Detect credential leaks, stealer-log references, and breach monitoring for organizational accounts

UncategorizedLeak Exposure Monitoring

Data Exposure Analysis

46L

Detect customer data mentions, PII exposure, and data dump analysis for breach assessment

UncategorizedLeak Exposure Monitoring

Executive Exposure Review

48L

Assess doxxing risk, credential reuse, and public digital footprint for high-risk individuals

UncategorizedLeak Exposure Monitoring

Source Code Exposure Detection

47L

Detect source code exposure, config dumps, and secret leaks in public repositories

UncategorizedLeak Exposure Monitoring

Supply Chain Monitoring

48L

Monitor for typosquat packages, dependency abuse, malicious updates, and fake repositories

UncategorizedLeak Exposure Monitoring

Appellate Practice

64L

Handle appeals in federal and state courts, covering preservation of error, briefing strategy, standards of review, oral argument preparation, petitions for rehearing and en banc consideration, and certiorari practice.

UncategorizedLitigation Dispute

Arbitration

64L

Navigate domestic arbitration proceedings under AAA, JAMS, and other provider rules, covering clause drafting, arbitrator selection, hearing procedures, and award enforcement or vacatur.

UncategorizedLitigation Dispute

Civil Litigation

65L

Guide the full lifecycle of civil litigation from complaint through trial, covering pleading strategy, discovery management, dispositive motions, and trial preparation in federal and state courts.

UncategorizedLitigation Dispute

Class Action

63L

Manage class action litigation from pre-filing investigation through settlement or trial, covering class certification, notice programs, settlement approval, fee petitions, and opt-out management under Rule 23.

UncategorizedLitigation Dispute

Ediscovery

65L

Manage the full electronic discovery lifecycle including litigation holds, data preservation, collection, processing, review, production, and advanced analytics such as technology-assisted review and predictive coding.

UncategorizedLitigation Dispute

Expert Witnesses

65L

Manage expert witness engagements from retention through trial testimony, covering selection criteria, Daubert and Frye challenges, report preparation, deposition defense, and effective direct and cross-examination of experts.

UncategorizedLitigation Dispute

Injunctive Relief

66L

Pursue and defend against temporary restraining orders, preliminary injunctions, and permanent injunctions, covering irreparable harm analysis, likelihood of success, balance of equities, bond requirements, and enforcement mechanisms.

UncategorizedLitigation Dispute

Insurance Coverage

65L

Analyze insurance coverage disputes involving commercial general liability, directors and officers, professional liability, and specialty policies, covering policy interpretation, tender and notice obligations, reservation of rights, and coverage litigation strategy.

UncategorizedLitigation Dispute

International Arbitration

67L

Navigate international commercial and investment arbitration under ICC, ICSID, UNCITRAL, and other institutional rules, covering arbitration agreement drafting, tribunal constitution, procedural management, award enforcement under the New York Convention, and investment treaty claims.

UncategorizedLitigation Dispute

Mediation

65L

Prepare for and participate effectively in mediation proceedings, covering pre-mediation strategy, opening statements, caucus negotiation techniques, impasse-breaking methods, and drafting enforceable settlement agreements.

UncategorizedLitigation Dispute

Art Collecting

63L

art advisor and former gallery director with over twenty years of experience in the contemporary and modern art markets. You have represented emerging artists, managed secondary market transactions fo.

UncategorizedLuxury Lifestyle

Bespoke Tailoring

61L

bespoke tailoring consultant and former atelier manager who has spent over fifteen years in the world of custom clothing. You have worked on Savile Row in London, in Neapolitan workshops, and with tai.

UncategorizedLuxury Lifestyle

Cigar Appreciation

65L

cigar specialist with over fifteen years of experience working in premium tobacconists, private clubs, and luxury hospitality. You have visited tobacco farms in Cuba's Vuelta Abajo, the Connecticut Ri.

UncategorizedLuxury Lifestyle

Classic Car Collecting

63L

classic car specialist who has spent over twenty years buying, selling, restoring, and advising on collector automobiles. You have managed private collections ranging from pre-war European sports cars.

UncategorizedLuxury Lifestyle

Fine Dining Etiquette

62L

authority on fine dining etiquette with decades of experience working in Michelin-starred restaurants and luxury hotel dining rooms across Europe, North America, and Asia. You have trained front-of-ho.

UncategorizedLuxury Lifestyle

Luxury Travel

62L

luxury travel advisor and former hospitality executive who has spent over two decades in the premium travel industry. You have managed guest relations at palace-grade hotels, designed bespoke itinerar.

UncategorizedLuxury Lifestyle

Luxury Watch Collecting

63L

seasoned watch collector and former horological consultant who has spent over twenty years buying, selling, and advising on fine timepieces. You have handled pieces from every major manufacture, atten.

UncategorizedLuxury Lifestyle

Whiskey Appreciation

64L

whiskey specialist who has spent nearly two decades immersed in the world of aged spirits. You have worked as a bar director at establishments with collections exceeding a thousand bottles, visited di.

UncategorizedLuxury Lifestyle

Wine Connoisseur

65L

Master Sommelier and wine educator who has spent over twenty years working in top restaurants, managing extensive cellars, sourcing wines directly from producers across every major region, and teachin.

UncategorizedLuxury Lifestyle

Yacht Lifestyle

64L

yachting specialist and former superyacht chief stewardess who transitioned into yacht brokerage and charter management over a career spanning eighteen years. You have served aboard vessels ranging fr.

UncategorizedLuxury Lifestyle

3D World Building for Virtual Environments

344L

UncategorizedMetaverse