Skip to main content
All CollectionsHiring ManagersHow to assess
List of Cyber Security Skills Supported by WeCP
List of Cyber Security Skills Supported by WeCP
Abhishek avatar
Written by Abhishek
Updated over a year ago

As of September 30, 2022, here is an exhaustive list of Cyber Security Skills supported by WeCP. Check here the complete list of skills supported by WeCP.

Cyber Security Skill

Relevant in Job Roles

Example Task

Question Types

Network Security

Network Security Analyst, Network Administrator, Security Engineer, Security Consultant, Security Analyst

Design and implement network security protocols to mitigate risks associated with unauthorized access, malware, and other threats

DevOps, Scripting + 10 Others

Endpoint Security

Security Analyst, Security Engineer, Endpoint Security Engineer, Endpoint Security Analyst, Security Consultant

Develop and implement endpoint security strategies to protect against malware, phishing, and other cyber attacks

DevOps, Scripting + 10 Others

Cloud Security

Cloud Security Architect, Cloud Security Engineer, Cloud Security Analyst, Cloud Security Consultant, Cloud Security Manager

Assess the security controls of cloud service providers and design strategies to protect against cloud-related cyber threats

DevOps, Scripting + 10 Others

Identity and Access Management (IAM)

Identity and Access Management (IAM) Analyst, IAM Architect, IAM Consultant, IAM Engineer, Security Analyst

Design and implement access control policies and procedures to protect against unauthorized access to systems and data

DevOps, Scripting + 10 Others

Data Security

Security Analyst, Data Security Analyst, Security Engineer, Security Consultant, Security Architect

Implement data encryption, data loss prevention, and other security controls to protect sensitive information

DevOps, Scripting + 10 Others

Threat Intelligence and Incident Response

Incident Response Analyst, Cybersecurity Analyst, Threat Intelligence Analyst, Cybersecurity Engineer, Security Analyst

Develop and implement incident response plans, conduct threat assessments, and perform vulnerability scans and assessments

DevOps, Scripting + 10 Others

Vulnerability Assessment and Penetration Testing (VAPT)

Penetration Tester, Vulnerability Assessor, Security Analyst, Security Consultant, Security Engineer

Conduct vulnerability assessments and penetration testing to identify security weaknesses and recommend remediation actions

DevOps, Scripting + 10 Others

Security Auditing and Compliance

Security Auditor, Compliance Analyst, Compliance Manager, Risk Management Analyst, Security Consultant

Conduct security audits and assessments to ensure compliance with regulatory requirements and industry best practices

DevOps, Scripting + 10 Others

Security Operations Center (SOC)

SOC Analyst, SOC Manager, Security Analyst, Security Engineer, Incident Responder

Monitor and analyze security events and alerts, and respond to security incidents as part of a security operations team

DevOps, Scripting + 10 Others

Application Security

Application Security Engineer, Application Security Specialist, Security Analyst, Security Consultant, Penetration Tester

Conduct code reviews, security testing, and other assessments to identify and mitigate security vulnerabilities in applications

DevOps, Scripting + 10 Others

Mobile Device Security

Mobile Security Engineer, Mobile Security Analyst, Security Analyst, Security Consultant, Mobile Device Management (MDM) Specialist

Develop and implement mobile device management policies and procedures to protect against mobile-related cyber threats

DevOps, Scripting + 10 Others

Cybersecurity Governance

Cybersecurity Manager, Information Security Manager, Security Analyst, Security Consultant, Compliance Manager

Develop and implement security policies and procedures, and oversee compliance with regulatory requirements and industry best practices

DevOps, Scripting + 10 Others

Social Engineering and Awareness

Security Awareness Trainer, Security Awareness Manager, Security Analyst, Security Consultant, Incident Responder

Conduct security awareness training and phishing simulations to educate employees and prevent social engineering attacks

DevOps, Scripting + 10 Others

Cryptography

Cryptographer, Cryptography Engineer, Security Analyst, Security Consultant, Security Engineer

Develop and implement cryptographic protocols and algorithms to protect sensitive data and communications

DevOps, Scripting + 10 Others

Cyber Threat Hunting

Cyber Threat Hunter, Threat Intelligence Analyst, Cybersecurity Analyst, Incident Responder, Security Analyst

Conduct advanced threat hunting and analysis, identify new threats, and develop strategies to mitigate cyber attacks

DevOps, Scripting + 10 Others

Here's an exhaustive list of cybersecurity tools that WeCP offers assessments on:

Category

Most Popular Usecase

Example Tools

Firewall

Network Security

Cisco ASA, Check Point Firewall, Palo Alto Networks Firewall

Antivirus

Malware Detection and Prevention

McAfee Antivirus, Norton Antivirus, Avast Antivirus

Intrusion Detection and Prevention Systems (IDPS)

Threat Detection and Prevention

Snort, Bro, Suricata

Vulnerability Scanner

Vulnerability Detection and Management

Nessus, Qualys, OpenVAS

Penetration Testing tools

Security Assessment and Penetration Testing

Metasploit, Nmap, Burp Suite

Data Loss Prevention (DLP) tools

Data Protection and Compliance

Symantec DLP, Forcepoint DLP, Digital Guardian

Security Information and Event Management (SIEM) tools

Threat Intelligence and Log Management

Splunk, LogRhythm, ArcSight

Identity and Access Management (IAM) tools

Identity and Access Management

Okta, Ping Identity, OneLogin

Encryption tools

Data Encryption

VeraCrypt, BitLocker, GnuPG

Multi-Factor Authentication (MFA) tools

User Authentication

Google Authenticator, Microsoft Authenticator, RSA SecurID

Web Application Firewall (WAF) tools

Web Application Security

ModSecurity, F5 Networks WAF, Akamai Kona Site Defender

Network Access Control (NAC) tools

Network Security and Access Management

Cisco ISE, Aruba ClearPass, Forescout CounterACT

Security Assessment and Compliance tools

Compliance Management and Risk Assessment

Qualys, Tenable.io, Rapid7

Security Operations Center (SOC) tools

Security Operations Management

IBM QRadar, McAfee ESM, RSA NetWitness

Incident Response tools

Incident Response and Management

FireEye, CrowdStrike Falcon, Carbon Black

Did this answer your question?