II.
Specialization JSON
Structured · livespecialization:security-research
specialization:security-research json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "specialization:security-research",
"_kind": "Specialization",
"_file": "domain/specializations/spec-tool-bridges.yaml",
"_cluster": "domain",
"attributes": {},
"outgoingEdges": [
{
"from": "specialization:security-research",
"to": "tool:owasp-zap",
"kind": "uses_tool"
},
{
"from": "specialization:security-research",
"to": "tool:snyk",
"kind": "uses_tool"
},
{
"from": "specialization:security-research",
"to": "tool:trivy",
"kind": "uses_tool"
},
{
"from": "specialization:security-research",
"to": "tool:checkov",
"kind": "uses_tool"
},
{
"from": "specialization:security-research",
"to": "domain:security",
"kind": "specializes"
}
],
"incomingEdges": [
{
"from": "domain:security",
"to": "specialization:security-research",
"kind": "contains"
},
{
"from": "role:privacy-engineer",
"to": "specialization:security-research",
"kind": "requires_skill",
"attributes": {
"level": "intermediate"
}
},
{
"from": "role:security-engineer",
"to": "specialization:security-research",
"kind": "requires_skill",
"attributes": {
"level": "expert"
}
},
{
"from": "skill-area:vulnerability-scanning-remediation",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "secondary"
}
},
{
"from": "skill-area:penetration-testing-ethical-hacking",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "secondary"
}
},
{
"from": "skill-area:threat-intelligence-hunting",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "secondary"
}
},
{
"from": "skill-area:code-cybersecurity",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:binary-analysis",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:reverse-engineering",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:exploit-development",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:zero-trust-architecture",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "secondary"
}
},
{
"from": "skill-area:SBOM-management",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:container-hardening",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:key-rotation",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "secondary"
}
},
{
"from": "skill-area:web-security",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "secondary"
}
},
{
"from": "skill-area:sast",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:dast",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:threat-modeling",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:secret-scanning",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:dependency-vulnerability-mgmt",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:supply-chain-security",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:container-security",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:network-security",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:identity-security",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "primary"
}
},
{
"from": "skill-area:fuzz-testing",
"to": "specialization:security-research",
"kind": "applies_to",
"attributes": {
"confidence": "secondary"
}
},
{
"from": "lib-agent:security-research--cloud-security-researcher",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--ctf-creator",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--exploit-developer",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--fuzzing-engineer",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--hardware-security-researcher",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--malware-analyst",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--mobile-researcher",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--purple-team-coordinator",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--red-team-operator",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--reverse-engineer",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--security-report-writer",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--smart-contract-auditor",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--threat-intel-analyst",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--vuln-researcher",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-agent:security-research--web-security-researcher",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-research--ai-ml-security-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--api-security-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--binary-reverse-engineering",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--bug-bounty-workflow",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--capture-the-flag-challenges",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--cloud-security-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--container-security-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--dynamic-analysis-runtime-testing",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--exploit-development",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--firmware-analysis",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--fuzzing-campaign",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--hardware-security-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--malware-analysis",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--mobile-app-security-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--network-penetration-testing",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--protocol-reverse-engineering",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--purple-team-exercise",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--red-team-operations",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--responsible-disclosure",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--security-advisory-writing",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--security-research-lab-setup",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--security-research-publication",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--security-tool-development",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--shellcode-development",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--smart-contract-auditing",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--static-code-analysis",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--supply-chain-security",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--threat-intelligence-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--variant-analysis",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--vulnerability-research-workflow",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--vulnerability-root-cause-analysis",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-research--web-app-vuln-research",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-skill:security-research--aiml-security",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--binary-exploitation",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--burp-websec",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--cloud-security-testing",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--cve-cwe-db",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--debugger-integration",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--fuzzing-ops",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--ghidra-ida-re",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--hardware-security",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--incident-forensics",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--mitre-attack",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--mobile-security",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--offensive-security",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--protocol-analysis",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--pwntools-exploit",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--security-sandbox",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--smart-contract-analysis",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--static-analysis-tools",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--stix-taxii",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "lib-skill:security-research--yara-rules",
"to": "specialization:security-research",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 1
}
},
{
"from": "page:library-security-research",
"to": "specialization:security-research",
"kind": "documents"
}
]
}