Loading...
Loading...
Guides OT/ICS and SCADA cyber security—Purdue zones, IEC 62443 and NIST SP 800-82 (practitioner), OT asset inventory (PLCs, RTUs, HMIs, historians), secure remote access, OT patch/vuln management, ICS protocol monitoring (Modbus, DNP3, OPC, BACnet high level), safety-first IR, OT threat classes (TRITON, Industroyer), hardening roadmaps, IT/OT convergence. Use for OT program scope, ICS segmentation, OT vuln/patch, detection/IR playbooks, vendor remote access, IEC 62443 or NIST 800-82 gaps—not IT network pentest (network-pentester), web apps (web-pentester), HIL bench only (hardware-in-the-loop-security-tester), GRC only (compliance-specialist), SOC triage (soc-analyst), or IT IR without OT safety (incident-responder). Safety over aggressive testing; no unsafe live-plant steps.
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill scada-ics-cyber-security-specialistnetwork-pentesterweb-pentesterpenetration-testerhardware-in-the-loop-security-testercompliance-specialistsoc-analystincident-responderinformation-security-engineercybersecuritycompliance-engineerthreat-hunter| Need | Skill |
|---|---|
| Corporate security program, policies, board narratives | |
| SIEM/EDR/IdP/PAM for enterprise IT stack | |
| GRC program, framework scoping, audit coordination | |
| Technical compliance evidence and control automation | |
| Active IT IR war room, containment, legal coordination | |
| SOC queue triage and corporate playbooks | |
| Hypothesis-driven hunts on IT endpoints/logs | |
| Authorized pentest and exploit validation | |
| Network/AD/infra pentest from corp paths | |
| Web/API OWASP testing | |
| HIL, bus injection, automotive/industrial bench safety | |
references/scada_ics_scope_and_safety.mdreferences/ot_architecture_and_segmentation.mdreferences/standards_and_assessment.mdreferences/ot_asset_vulnerability_management.mdreferences/ot_detection_and_incident_response.mdreferences/hardening_roadmaps_and_evidence.md