Loading...
Loading...
Guides information security engineering—implementing and operating security controls, identity and access systems, encryption and secrets management, security tool integrations (SIEM, EDR, SOAR), cloud guardrails, hardening baselines, and remediation engineering for vulnerabilities. Use when building SSO/RBAC/PAM patterns, configuring KMS or certificate lifecycle, deploying WAF/DLP or EDR connectors, writing security-as-code policies (OPA, SCPs, CIS benchmarks), integrating logging to SIEM, automating security workflows, or validating control fixes—not for SOC triage (soc-analyst), pentesting (penetration-tester, network-pentester, web-pentester), red team (red-team-specialist), CI gates only (devsecops), platform provisioning without security ownership (infrastructure-engineer), CISO/exec program (chief-information-security-officer), security program strategy (cybersecurity), GRC program and audit prep (compliance-specialist), or product tenancy isolation (product-infrastructure-security-engineer).
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill information-security-engineerchief-information-security-officercybersecuritycompliance-specialistsoc-analystdefensive-security-analystpenetration-testernetwork-pentesterweb-pentesterred-team-specialistdevsecopsproduct-infrastructure-security-engineercloud-security-engineeriam-specialist| Need | Skill |
|---|---|
| CISO program, board KRIs, appetite, budget | |
| AWS/GCP/Azure guardrails, CSPM, cloud IAM/network | |
| GRC program, gap plans, audit coordination | |
| Security strategy, policies | |
| Audit evidence automation | |
| CI/CD scans, SBOM, pipeline OIDC | |
| VPC, K8s, Terraform platform (general) | |
| SOC triage and SOAR playbooks | |
| Red team gaps → detection content | |
| Declared security incident response (CSIRT) | |
| STIX/TAXII feed requirements, intel-driven blocklists | |
| Threat hunts and detection engineering | |
| Pentest findings to reproduce | |
| Control documentation | |
| Product tenancy, customer data plane | |
| CVD program, bounty, disclosure calendar | |
| Post-incident artifact analysis and chain of custody | |
| Risk registers, residual scoring, treatment decisions | |
| IAM lifecycle, entitlements, reviews, federation, PAM | |
| BCM/DRP for security tooling, immutability, restore tests | |
references/control_hardening.mdhuman identity (SSO/MFA) → RBAC/ABAC → service identities → privileged access (PAM) → periodic reviewreferences/identity_access_engineering.md| Layer | Typical implementation |
|---|---|
| Data at rest | KMS, volume encryption, TDE |
| Data in transit | TLS 1.2+, cert automation (ACME/internal CA) |
| Application secrets | Vault, cloud secret manager, rotation |
| Keys | CMK policies, separation of duties, audit logs |
references/encryption_secrets.mdreferences/security_tooling.mdreferences/vulnerability_remediation.mdreferences/control_hardening.mdreferences/identity_access_engineering.mdreferences/encryption_secrets.mdreferences/security_tooling.mdreferences/vulnerability_remediation.md