II.
Domain overview
Reference · livedomain:cybersecurity
Cybersecurity overview
Cybersecurity domain — narrower than `domain:security`, focused on offensive/defensive practitioner work: threat modeling, incident response, vulnerability research, red/blue team operations.
Attributes
displayName
Cybersecurity
description
Cybersecurity domain — narrower than `domain:security`, focused on
offensive/defensive practitioner work: threat modeling, incident
response, vulnerability research, red/blue team operations.
Outgoing edges
contains3
- specialization:security-compliance·Specialization
- topic:ci-secrets-management·TopicCI Secrets Management
- topic:information-trust-tiers·TopicInformation Trust Tiers
Incoming edges
applies_to51
- benchmark:cyber-bench·BenchmarkCyberBench
- skill-area:vulnerability-scanning-remediation·SkillAreaVulnerability Scanning and Remediation
- skill-area:penetration-testing-ethical-hacking·SkillAreaPenetration Testing and Ethical Hacking
- skill-area:security-monitoring-siem·SkillAreaSecurity Monitoring and SIEM
- skill-area:endpoint-security-edr·SkillAreaEndpoint Security and EDR
- skill-area:application-security-testing·SkillAreaApplication Security Testing (SAST/DAST)
- skill-area:incident-response-forensics·SkillAreaIncident Response and Forensics
- skill-area:data-protection-dlp·SkillAreaData Protection and DLP
- skill-area:threat-intelligence-hunting·SkillAreaThreat Intelligence and Hunting
- skill-area:ci-security·SkillAreaCI/CD Security
- skill-area:vulnerability-scanning·SkillAreaVulnerability Scanning
- skill-area:iac-security·SkillAreaIaC Security
- skill-area:application-security·SkillAreaApplication Security
- skill-area:runtime-security·SkillAreaRuntime Security
- skill-area:threat-detection·SkillAreaThreat Detection
- skill-area:policy-enforcement·SkillAreaPolicy Enforcement
- skill-area:compliance-scanning·SkillAreaCompliance Scanning
- skill-area:dast-scanning·SkillAreaDAST Scanning
- skill-area:web-security-testing·SkillAreaWeb Security Testing
- skill-area:fuzz-testing-strategy·SkillAreaFuzz Testing Strategy
- stack-profile:security-operations·StackProfileSecurity Operations Stack (Trivy, Falco, OPA, Vault, Snyk)
- stack-profile:ai-safety-guardrails·StackProfileAI Safety / Guardrails Stack (Python, OPA, FastAPI, Redis, Prometheus)
- stack-profile:container-registry-scanning·StackProfileContainer Registry & Scanning (Docker, Trivy, Kubernetes, Go, Snyk)
- stack-profile:secrets-management·StackProfileSecrets Management (Vault, Kubernetes, Terraform, Docker, Go)
- stack-profile:siem-platform·StackProfileSIEM Platform (Elasticsearch, Python, RabbitMQ, Redis, React, PostgreSQL)
- stack-profile:vulnerability-management-platform·StackProfileVulnerability Management (Python, Trivy, Snyk, PostgreSQL, React, Docker)
- stack-profile:identity-governance·StackProfileIdentity Governance (Keycloak, PostgreSQL, React, Go, Docker)
- topic:defense-in-depth·TopicDefense in Depth
- topic:zero-trust-architecture·TopicZero Trust Architecture
- topic:information-trust-tiers·TopicInformation Trust Tiers
- topic:ci-secrets-management·TopicCI Secrets Management
- skill:security-review·SkillSecurity Review
- role:penetration-tester·RolePenetration Tester
- role:security-architect·Role
- role:threat-analyst·RoleThreat Analyst
- role:soc-analyst·RoleSOC Analyst
- role:forensic-analyst·RoleDigital Forensic Analyst
- role:red-team-lead·RoleRed Team Lead
- role:blue-team-lead·RoleBlue Team Lead
- role:DevSecOps-engineer·Role
- role:head-of-security·RoleHead of Security
- role:chief-security-officer·RoleChief Security Officer
- role:vulnerability-scanner·RoleVulnerability Scanner
- term:authority·TermAuthority
- term:claim·TermClaim
- term:evidence-policy·TermEvidencePolicy
- term:json-web-token·TermJSON Web Token
- term:sandbox·TermSandbox
- term:session·TermSession
- term:trust-chain·TermTrust Chain
- term:trust-level·TermTrustLevel
applies_to_domain27
- workflow:compliance-audit·WorkflowCompliance Audit
- workflow:vendor-evaluation·WorkflowVendor Evaluation
- workflow:vulnerability-management·Workflow
- workflow:access-review·WorkflowAccess Review
- workflow:security-audit·Workflow
- workflow:penetration-testing-cycle·WorkflowPenetration Testing Cycle
- workflow:pci-dss-scoping·WorkflowPCI DSS Scoping
- workflow:access-control-audit·WorkflowAccess Control Audit
- workflow:key-ceremony·WorkflowKey Ceremony
- workflow:smart-contract-audit·WorkflowSmart Contract Audit
- workflow:cryptographic-library-upgrade·WorkflowCryptographic Library Upgrade
- workflow:security-incident-response·WorkflowSecurity Incident Response
- workflow:cve-triage·WorkflowCVE Triage
- workflow:penetration-testing·WorkflowPenetration Testing Engagement
- workflow:hipaa-compliance-audit·WorkflowHIPAA Compliance Audit
- workflow:phishing-simulation-exercise·WorkflowPhishing Simulation Exercise
- workflow:fuzzing-campaign·WorkflowFuzzing Campaign
- workflow:supply-chain-attack-simulation·WorkflowSupply Chain Attack Simulation
- workflow:cve-response-coordination·WorkflowCVE Response Coordination
- workflow:penetration-test-cycle·WorkflowPenetration Test Cycle
- workflow:red-team-exercise·WorkflowRed Team Exercise
- workflow:bug-bounty-triage·WorkflowBug Bounty Triage
- workflow:security-review·WorkflowSecurity Review
- workflow:vulnerability-management·Workflow
- workflow:systems-memory-safety-audit·WorkflowSystems Memory Safety Audit
- workflow:security-review·WorkflowSecurity Review
- workflow:vulnerability-management·Workflow
belongs_to_domain2
- topic:prompt-injection·TopicPrompt Injection
- topic:autonomous-agents-safety·TopicAutonomous Agents Safety
deferred_for1
- deferred:trust-tiers·DeferredNodeTrust Tiers
lib_applies_to_domain77
- tool-server:mcp-splunk·ToolServerSplunk MCP Server
- tool-server:mcp-trivy·ToolServerTrivy MCP Server
- tool-server:mcp-owasp-zap·ToolServerOWASP ZAP MCP Server
- tool-server:mcp-opa·ToolServerOPA MCP Server
- tool-server:mcp-checkov·ToolServerCheckov Security Scanner MCP Server
- tool-server:mcp-falco·ToolServerFalco MCP Server
- tool-server:mcp-snyk·ToolServerSnyk MCP Server
- tool-server:mcp-sonarqube·ToolServerSonarQube MCP Server
- tool-server:mcp-1password·ToolServer1Password MCP Server
- tool-server:mcp-vault·ToolServerHashiCorp Vault MCP Server
- lib-agent:security-research--cloud-security-researcher·LibraryAgentcloud-security-researcher
- lib-agent:security-research--ctf-creator·LibraryAgentCTF Challenge Creator Agent
- lib-agent:security-research--exploit-developer·LibraryAgentExploit Developer Agent
- lib-agent:security-research--fuzzing-engineer·LibraryAgentfuzzing-engineer
- lib-agent:security-research--hardware-security-researcher·LibraryAgenthardware-security-researcher
- lib-agent:security-research--malware-analyst·LibraryAgentMalware Analyst Agent
- lib-agent:security-research--mobile-researcher·LibraryAgentMobile Security Researcher Agent
- lib-agent:security-research--purple-team-coordinator·LibraryAgentPurple Team Coordinator Agent
- lib-agent:security-research--red-team-operator·LibraryAgentRed Team Operator Agent
- lib-agent:security-research--reverse-engineer·LibraryAgentReverse Engineer Agent
- lib-agent:security-research--security-report-writer·LibraryAgentSecurity Report Writer Agent
- lib-agent:security-research--smart-contract-auditor·LibraryAgentSmart Contract Auditor Agent
- lib-agent:security-research--threat-intel-analyst·LibraryAgentThreat Intelligence Analyst Agent
- lib-agent:security-research--vuln-researcher·LibraryAgentVulnerability Researcher Agent
- lib-agent:security-research--web-security-researcher·LibraryAgentWeb Security Researcher Agent
- lib-process:security-research--ai-ml-security-research·LibraryProcessai-ml-security-research
- lib-process:security-research--api-security-research·LibraryProcessapi-security-research
- lib-process:security-research--binary-reverse-engineering·LibraryProcessbinary-reverse-engineering
- lib-process:security-research--bug-bounty-workflow·LibraryProcessbug-bounty-workflow
- lib-process:security-research--capture-the-flag-challenges·LibraryProcesscapture-the-flag-challenges
- lib-process:security-research--cloud-security-research·LibraryProcesscloud-security-research
- lib-process:security-research--container-security-research·LibraryProcesscontainer-security-research
- lib-process:security-research--dynamic-analysis-runtime-testing·LibraryProcessdynamic-analysis-runtime-testing
- lib-process:security-research--exploit-development·LibraryProcessexploit-development
- lib-process:security-research--firmware-analysis·LibraryProcessfirmware-analysis
- lib-process:security-research--fuzzing-campaign·LibraryProcessfuzzing-campaign
- lib-process:security-research--hardware-security-research·LibraryProcesshardware-security-research
- lib-process:security-research--malware-analysis·LibraryProcessmalware-analysis
- lib-process:security-research--mobile-app-security-research·LibraryProcessmobile-app-security-research
- lib-process:security-research--network-penetration-testing·LibraryProcessnetwork-penetration-testing
- lib-process:security-research--protocol-reverse-engineering·LibraryProcessprotocol-reverse-engineering
- lib-process:security-research--purple-team-exercise·LibraryProcesspurple-team-exercise
- lib-process:security-research--red-team-operations·LibraryProcessred-team-operations
- lib-process:security-research--responsible-disclosure·LibraryProcessresponsible-disclosure
- lib-process:security-research--security-advisory-writing·LibraryProcesssecurity-advisory-writing
- lib-process:security-research--security-research-lab-setup·LibraryProcesssecurity-research-lab-setup
- lib-process:security-research--security-research-publication·LibraryProcesssecurity-research-publication
- lib-process:security-research--security-tool-development·LibraryProcesssecurity-tool-development
- lib-process:security-research--shellcode-development·LibraryProcessshellcode-development
- lib-process:security-research--smart-contract-auditing·LibraryProcesssmart-contract-auditing
- lib-process:security-research--static-code-analysis·LibraryProcessstatic-code-analysis
- lib-process:security-research--supply-chain-security·LibraryProcesssupply-chain-security
- lib-process:security-research--threat-intelligence-research·LibraryProcessthreat-intelligence-research
- lib-process:security-research--variant-analysis·LibraryProcessvariant-analysis
- lib-process:security-research--vulnerability-research-workflow·LibraryProcessvulnerability-research-workflow
- lib-process:security-research--vulnerability-root-cause-analysis·LibraryProcessvulnerability-root-cause-analysis
- lib-process:security-research--web-app-vuln-research·LibraryProcessweb-app-vuln-research
- lib-skill:security-research--aiml-security·LibrarySkillaiml-security
- lib-skill:security-research--binary-exploitation·LibrarySkillBinary Exploitation Skill
- lib-skill:security-research--burp-websec·LibrarySkillBurp Suite/Web Security Skill
- lib-skill:security-research--cloud-security-testing·LibrarySkillcloud-security-testing
- lib-skill:security-research--cve-cwe-db·LibrarySkillCVE/CWE Database Skill
- lib-skill:security-research--debugger-integration·LibrarySkillDebugger Integration Skill
- lib-skill:security-research--fuzzing-ops·LibrarySkillFuzzing Operations Skill
- lib-skill:security-research--ghidra-ida-re·LibrarySkillGhidra/IDA Reverse Engineering Skill
- lib-skill:security-research--hardware-security·LibrarySkillhardware-security
- lib-skill:security-research--incident-forensics·LibrarySkillincident-forensics
- lib-skill:security-research--mitre-attack·LibrarySkillMITRE ATT&CK Skill
- lib-skill:security-research--mobile-security·LibrarySkillMobile Security Testing Skill
- lib-skill:security-research--offensive-security·LibrarySkillOffensive Security Skill
- lib-skill:security-research--protocol-analysis·LibrarySkillNetwork Protocol Analysis Skill
- lib-skill:security-research--pwntools-exploit·LibrarySkillPwntools Exploitation Skill
- lib-skill:security-research--security-sandbox·LibrarySkillsecurity-sandbox
- lib-skill:security-research--smart-contract-analysis·LibrarySkillSmart Contract Analysis Skill
- lib-skill:security-research--static-analysis-tools·LibrarySkillStatic Analysis Tools Skill
- lib-skill:security-research--stix-taxii·LibrarySkillSTIX/TAXII Intelligence Skill
- lib-skill:security-research--yara-rules·LibrarySkillYARA Rules Skill
requires_skill5
- role:compliance-engineer·RoleCompliance Engineer
- role:compliance-officer·RoleCompliance Officer
- role:privacy-engineer·RolePrivacy Engineer
- role:audit-analyst·RoleAudit Analyst
- role:security-engineer·RoleSecurity Engineer
specializes1
- specialization:security-compliance·Specialization