cybersecurity-analyst
Analyzes security risks, threats, and vulnerabilities using industry frameworks like STRIDE, MITRE ATT&CK, and CIA triad.
- Applies threat modeling, attack surface analysis, and defense-in-depth principles to identify security weaknesses across systems, applications, and architectures
- Evaluates confidentiality, integrity, and availability risks; assesses threat actors, attack vectors, and defensive control effectiveness
- Provides incident analysis, vulnerability assessment, security architecture review, and risk-based remediation recommendations aligned to NIST, ISO 27001, and compliance standards
- Covers detection and response capabilities, zero-trust design, and supply chain security considerations for comprehensive security posture evaluation
Cybersecurity Analyst Skill
Purpose
Analyze events through the disciplinary lens of cybersecurity, applying rigorous security frameworks (CIA triad, defense-in-depth, zero-trust), threat modeling methodologies (STRIDE, PASTA, VAST), attack surface analysis, and industry standards (NIST, ISO 27001, MITRE ATT&CK) to understand security risks, identify vulnerabilities, assess threat actors and attack vectors, evaluate defensive controls, and recommend risk mitigation strategies.
When to Use This Skill
- Security Incident Analysis: Investigate breaches, data leaks, ransomware attacks, insider threats
- Vulnerability Assessment: Identify weaknesses in systems, applications, networks, processes
- Threat Modeling: Analyze potential attack vectors and threat actors for new systems or changes
- Security Architecture Review: Evaluate design decisions for security implications and gaps
- Risk Assessment: Quantify and prioritize security risks using frameworks like CVSS, FAIR
- Compliance Analysis: Assess adherence to security standards (SOC 2, PCI-DSS, HIPAA, GDPR)
- Incident Response Planning: Design detection, containment, eradication, and recovery strategies
- Security Posture Evaluation: Assess overall defensive capabilities and maturity
- Code Security Review: Identify security vulnerabilities in software implementations
Core Philosophy: Security Thinking
More from rysweet/amplihack
lawyer-analyst
|
558pptx
Presentation creation, editing, and analysis. When Claude needs to work with presentations (.pptx files) for: (1) Creating new presentations, (2) Modifying or editing content, (3) Working with layouts, (4) Adding comments or speaker notes, or any other presentation tasks
394mermaid-diagram-generator
|
375psychologist-analyst
|
348economist-analyst
|
346storytelling-synthesizer
|
280