Loading...
Loading...
Compare original and translation side by side
chief-information-security-officercybersecuritycompliance-specialistsoc-analystdefensive-security-analystpenetration-testernetwork-pentesterweb-pentesterred-team-specialistdevsecopsproduct-infrastructure-security-engineercloud-security-engineeriam-specialistchief-information-security-officercybersecuritycompliance-specialistsoc-analystdefensive-security-analystpenetration-testernetwork-pentesterweb-pentesterred-team-specialistdevsecopsproduct-infrastructure-security-engineercloud-security-engineeriam-specialist| Need | Skill |
|---|---|
| CISO program, board KRIs, appetite, budget | |
| AWS/GCP/Azure guardrails, CSPM, cloud IAM/network | |
| GRC program, gap plans, audit coordination | |
| Security strategy, policies | |
| Audit evidence automation | |
| CI/CD scans, SBOM, pipeline OIDC | |
| VPC, K8s, Terraform platform (general) | |
| SOC triage and SOAR playbooks | |
| Red team gaps → detection content | |
| Declared security incident response (CSIRT) | |
| STIX/TAXII feed requirements, intel-driven blocklists | |
| Threat hunts and detection engineering | |
| Pentest findings to reproduce | |
| Control documentation | |
| Product tenancy, customer data plane | |
| CVD program, bounty, disclosure calendar | |
| Post-incident artifact analysis and chain of custody | |
| Risk registers, residual scoring, treatment decisions | |
| IAM lifecycle, entitlements, reviews, federation, PAM | |
| BCM/DRP for security tooling, immutability, restore tests | |
| 需求 | 技能 |
|---|---|
| CISO项目、董事会KRI、风险偏好、预算 | |
| AWS/GCP/Azure防护规则、CSPM、云IAM/网络 | |
| GRC项目、缺口计划、审计协调 | |
| 安全战略、政策制定 | |
| 审计证据自动化 | |
| CI/CD扫描、SBOM、流水线OIDC | |
| VPC、K8s、Terraform平台(通用) | |
| SOC分诊及SOAR剧本 | |
| 红队缺口检测规则编写 | |
| 已申报安全事件响应(CSIRT) | |
| STIX/TAXII feed需求、情报驱动型黑名单 | |
| 威胁狩猎及检测工程 | |
| 渗透测试结果复现 | |
| 控制措施文档编写 | |
| 产品租户隔离、客户数据平面 | |
| CVD项目、漏洞赏金、披露日历 | |
| 事件后工件分析及链状证据管理 | |
| 风险登记、残余风险评分、处置决策 | |
| IAM生命周期、权限管理、访问评审、联邦认证、PAM | |
| 安全工具业务连续性/灾难恢复计划、不可变性、恢复测试 | |
references/control_hardening.mdreferences/control_hardening.mdhuman identity (SSO/MFA) → RBAC/ABAC → service identities → privileged access (PAM) → periodic reviewreferences/identity_access_engineering.mdhuman identity (SSO/MFA) → RBAC/ABAC → service identities → privileged access (PAM) → periodic reviewreferences/identity_access_engineering.md| Layer | Typical implementation |
|---|---|
| Data at rest | KMS, volume encryption, TDE |
| Data in transit | TLS 1.2+, cert automation (ACME/internal CA) |
| Application secrets | Vault, cloud secret manager, rotation |
| Keys | CMK policies, separation of duties, audit logs |
references/encryption_secrets.md| 层级 | 典型实现方式 |
|---|---|
| 静态数据 | KMS、卷加密、TDE |
| 传输中数据 | TLS 1.2+、证书自动化(ACME/内部CA) |
| 应用密钥 | Vault、云密钥管理器、密钥轮换 |
| 密钥管理 | CMK策略、职责分离、审计日志 |
references/encryption_secrets.mdreferences/security_tooling.mdreferences/security_tooling.mdreferences/vulnerability_remediation.mdreferences/vulnerability_remediation.mdreferences/control_hardening.mdreferences/identity_access_engineering.mdreferences/encryption_secrets.mdreferences/security_tooling.mdreferences/vulnerability_remediation.mdreferences/control_hardening.mdreferences/identity_access_engineering.mdreferences/encryption_secrets.mdreferences/security_tooling.mdreferences/vulnerability_remediation.md