competitor-analyst
Competitor Analyst
Overview
This skill provides structured frameworks for competitive intelligence—from gathering information on competitors through applying analytical frameworks (SWOT, Porter's Five Forces, positioning maps, feature matrices) to synthesizing insights into strategic recommendations. Good competitive analysis reveals where to attack, where to defend, and how to position your product to win.
When to Use
- Building a competitive landscape analysis for investors, board, or internal strategy
- Creating a feature comparison matrix for sales or product teams
- Developing a competitive positioning strategy
- Tracking and monitoring competitor moves over time
- Preparing a competitive battle card for sales
- Identifying whitespace opportunities in the market
When NOT to Use
- Sizing total market opportunity (use market-researcher skill)
- Writing a full pitch deck (use pitch-deck-writer skill)
- Conducting primary research interviews with competitor customers (use ux-researcher skill)
- Financial modeling or pricing analysis (use a finance skill)
More from nickcrew/claude-ctx-plugin
react-performance-optimization
React performance optimization patterns using memoization, code splitting, and efficient rendering strategies. Use when optimizing slow React applications, reducing bundle size, or improving user experience with large datasets.
1.2Kowasp-top-10
OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.
452ui-design-aesthetics
Generates high-quality, non-generic UI designs with a focus on performance, progressive disclosure, and distinctive aesthetics.
114helm-chart-patterns
Helm chart development patterns for packaging and deploying Kubernetes applications. Use when creating reusable Helm charts, managing multi-environment deployments, or building application catalogs for Kubernetes.
110code-explanation
Use when explaining code, concepts, or system behavior to a specific audience level - provides a structured explanation workflow with depth control and validation steps.
103security-testing-patterns
Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.
91