Loading...
Loading...
Found 3,733 Skills
FraudLabs Pro integration. Manage data, records, and automate workflows. Use when the user wants to interact with FraudLabs Pro data.
Discourse integration. Manage Forums. Use when the user wants to interact with Discourse data.
Everestcard integration. Manage data, records, and automate workflows. Use when the user wants to interact with Everestcard data.
Vanta integration. Manage data, records, and automate workflows. Use when the user wants to interact with Vanta data.
UKG Pro integration. Manage data, records, and automate workflows. Use when the user wants to interact with UKG Pro data.
Zoho Creator integration. Manage Applications, Users, Roles. Use when the user wants to interact with Zoho Creator data.
You Can Book Me integration. Manage data, records, and automate workflows. Use when the user wants to interact with You Can Book Me data.
Guides corporate transaction execution—M&A, divestitures, financings, and JVs: deal timeline, diligence workstreams, data room and Q&A, conditions precedent, closing matrix, signing logistics, funds flow, and post-close handoff to integration. Use when running a live deal, maintaining a closing checklist, coordinating legal/tax/HR/IT workstreams, tracking CPs and signatures, or preparing signing/closing binders—not for sales quote-to-cash (deal-operations-administrator), drafting board resolutions (corporate-counsel), commercial contract redlines (commercial-counsel), deal thesis or IC strategy (transaction-principal), general consulting (business-consultant), or generic software programs (technical-program-manager). Output coordinates process; human counsel and executives approve binding steps.
Guides information security engineering—implementing and operating security controls, identity and access systems, encryption and secrets management, security tool integrations (SIEM, EDR, SOAR), cloud guardrails, hardening baselines, and remediation engineering for vulnerabilities. Use when building SSO/RBAC/PAM patterns, configuring KMS or certificate lifecycle, deploying WAF/DLP or EDR connectors, writing security-as-code policies (OPA, SCPs, CIS benchmarks), integrating logging to SIEM, automating security workflows, or validating control fixes—not for SOC triage (soc-analyst), pentesting (penetration-tester, network-pentester, web-pentester), red team (red-team-specialist), CI gates only (devsecops), platform provisioning without security ownership (infrastructure-engineer), CISO/exec program (chief-information-security-officer), security program strategy (cybersecurity), GRC program and audit prep (compliance-specialist), or product tenancy isolation (product-infrastructure-security-engineer).
Guides senior system and solution architecture—cross-service boundaries, integration patterns, non-functional requirements (scale, reliability, security, cost), ADRs, C4-style modeling, architecture review, build-vs-buy, and phased migration (strangler, dual-write). Use when designing multi-service systems, evaluating platform or vendor choices, writing or reviewing architecture decision records, defining standards and principles, or assessing technical risk across domains—not for single-service RFCs and module design (senior-software-engineer), data platform or mesh decisions (data-architect), cloud landing zone, Well-Architected, and migration architecture (cloud-architect), cloud/IaC implementation (infrastructure-engineer, cloud-engineer), internal developer platform product (platform-engineer), or program tracking (technical-program-manager). For business strategy and cases, use business-consultant; for applied AI (RAG, agents, copilots), use applied-ai-architect-commercial-enterprise.
Guides security assessment of embedded and cyber-physical systems on hardware-in-the-loop (HIL) test benches—bench setup, ECU/ECM or PLC targets, bus interfaces (CAN/CAN-FD, LIN, automotive Ethernet, Modbus at high level), fault injection and stimulus design, simulated plant/environment integration, attack-surface monitoring on real hardware, reproducible test cases, lab safety interlocks, and evidence capture for firmware and vehicle security teams. Use for HIL security testing, ECU security assessment, CAN bus security, PLC HIL test, fault injection lab, embedded hardware security—not web/API pentest (web-pentester), network-only pentest (network-pentester), malware/binary RE only (reverse-engineer), SOC operations (soc-analyst), AI red team (ai-redteam), classified ISSO paperwork (information-systems-security-officer-classified-specialist), or pure software CI without hardware (build-validator).
Guides enterprise-scale cloud architecture—multi-BU landing zones and federation, cloud Center of Excellence governance, enterprise agreement and commit strategy, org-wide FinOps and chargeback, regulated-workload patterns (residency, segmentation), hybrid integration with identity and ERP, and architecture review board standards for large organizations. Use when designing cloud at hundreds of accounts, steering CCoE policy, EA/MACC optimization, sovereign or regulated cloud placement, or executive cloud governance—not for single-product cloud designs (cloud-architect), hands-on service config (cloud-engineer), SOC 2 evidence automation (compliance-engineer), general cross-domain ADRs (senior-system-architecture), or enterprise AI copilot architecture (applied-ai-architect-commercial-enterprise), or VP-level cloud program portfolio and board narratives (vp-of-cloud).