- Required for role - Nice to Have - In an ideal world
Security Researcher | |
---|---|
Reporting skills | 2 |
Summary technical knowledge | 2 |
Presentation Skills | 1 |
Security-to-Business Integration | 2 |
Training Materials | 1 |
Networking Basics | 2 |
Network protocol fundamentals | 2 |
Web App Basics | 2 |
Web Protocol Basics | 1 |
Infrastructure Basics | 2 |
WiFi hacking Basics | 2 |
Radio Hacking | 1 |
RFID hacking | 0 |
Android Hacking | 1 |
Apple iOS Hacking | 1 |
Exploit Development | 2 |
Tool Development | 2 |
Social Engineering | 0 |
Advanced Locksport | 0 |
OSINT | 0 |
Red Team Physical Access | 0 |
Windows Sandbox/Desktop Breakout | 0 |
Linux Sandbox/Desktop breakout | 0 |
GDPR Basics | 1 |
ISO27001 Basics | 0 |
PCI DSS Basics | 1 |
Embedded System basics | 1 |
IoT Fundamentals | 1 |
GDPR | 0 |
ISO27001 | 0 |
PCI DSS | 0 |
Basic Dynamic Binary Analysis | 2 |
Basics of Static Analysis | 2 |
Binary Reverse Engineering - x86 | 2 |
Binary Reverse Engineering - ARM | 2 |
Binary Reverse Engineering | 1 |
SIEM | 0 |
SIEM configuration and content management | 0 |
Principles of secure network design | 1 |
Advanced Network Protocol Analysis | 2 |
Advanced Windows Networking topics | 0 |
Windows Secure Configuration | 0 |
Linux Secure Configuration | 0 |
Perimeter Security Device Configuration | 0 |
Data Science and Advanced Data Analysis Techniques | 1 |
Machine Learning | 1 |
Intrusion detection principles | 2 |
Advanced Intrusion Detection techniques | 1 |