领域
Security
技能档案
OWASP Top 10, XSS, CSRF, SQL injection, SSRF, security headers
角色数
70
包含此技能的角色
级别数
5
结构化成长路径
必要要求
106
其余 232 个可选
Security
Application Security
2026/3/17
选择当前级别并对比期望。下方卡片显示晋升所需掌握的内容。
表格展示从初级到首席的技能深度变化。点击行查看详情。
| 角色 | 必要性 | 描述 |
|---|---|---|
| 1C Developer | Familiar with key OWASP vulnerabilities and understands their applicability to 1C systems. Applies basic security checks when developing web services and HTTP handlers in 1C. | |
| AI Product Engineer | Learns about key OWASP Top 10 vulnerabilities and their impact on AI product security. Understands basic principles for protecting ML service API endpoints from injection and unauthorized access. | |
| Analytics Engineer | Getting familiar with major OWASP vulnerabilities and their impact on analytics system security. Understands SQL injection risks and unauthorized access to analytical data and dashboards. | |
| Android Developer | 必要 | Knows the main mobile application vulnerabilities from OWASP Mobile Top 10: insecure data storage, weak authentication, unprotected data transmission. Understands the importance of HTTPS, does not store passwords in SharedPreferences in plain text, uses EncryptedSharedPreferences for sensitive data, checks permissions before accessing camera and contacts. |
| Application Security Engineer | 必要 | Understands basic OWASP and application security concepts. Follows security guidelines. Recognizes typical code vulnerabilities. |
| AR/VR Developer | Knows the main OWASP vulnerabilities and their applicability to AR/VR applications. Understands specific security risks — protecting spatial data and biometrics. | |
| Backend Developer (C#/.NET) | Knows OWASP Top 10. Prevents SQL injection via EF Core parameterization. Uses anti-forgery tokens. Applies [Authorize] and ASP.NET Core Identity. | |
| Backend Developer (Elixir) | Understands basic OWASP Top 10 vulnerabilities in the context of Phoenix applications. Avoids SQL injection through parameterized Ecto queries, XSS through auto-escaping in EEx templates. Applies CSRF protection through Phoenix.HTML.Token and Plug.CSRFProtection in forms. | |
| Backend Developer (Go) | Understands OWASP Top 10 threats in the context of Go development: SQL injection (parameterized queries via pgx), XSS (html/template with auto-escaping), CSRF protection. Uses gosec for static security analysis of Go code in the CI pipeline. | |
| Backend Developer (Java/Kotlin) | Knows OWASP Top 10 vulnerabilities. Prevents SQL injection through parameterized queries (JPA). Escapes user input for XSS protection. Uses CSRF tokens in Spring Security. | |
| Backend Developer (Node.js) | Knows OWASP Top 10 for Node.js: XSS prevention (helmet), SQL injection (parameterized queries), CSRF tokens. Uses express-rate-limit. Checks npm audit. | |
| Backend Developer (PHP) | Knows OWASP Top 10: SQL injection, XSS, CSRF. Uses prepared statements instead of SQL concatenation. Escapes output. Understands why CSRF tokens are needed. Does not store passwords in plain text. | |
| Backend Developer (Python) | 必要 | Knows OWASP Top 10. Understands SQL injection and XSS. Uses parameterized queries. Validates input data via Pydantic. |
| Backend Developer (Rust) | Understands main OWASP vulnerabilities in Rust service context: SQL injection (prevented by parameterized SQLx queries), XSS (escaping through askama/tera). Applies basic security practices leveraging Rust's type safety. | |
| Backend Developer (Scala) | Familiar with main OWASP Top 10 vulnerabilities in Scala development context: SQL injection through parameterized queries in Doobie, XSS protection in Play Framework templates. Understands input validation importance and uses built-in framework security mechanisms. | |
| BI Analyst | Understands basic data security principles and OWASP vulnerabilities relevant to BI systems. Knows fundamentals of personal data protection and can apply basic PII masking in reports. Recognizes responsibility when working with confidential data in analytical systems. | |
| Blockchain Developer | Understands basic OWASP concepts applied to blockchain applications — common smart contract vulnerabilities (reentrancy, integer overflow), web3 frontend security risks, and secure RPC endpoint configuration. Follows security guidelines for DApp development and recognizes common Web3-specific attack patterns. | |
| Cloud Engineer | 必要 | Knows about OWASP Top 10. Understands main vulnerabilities: SQL injection, XSS, CSRF. Uses parameterized queries. Does not store passwords in plaintext. |
| Compiler Engineer | Knows main OWASP Top 10 vulnerability categories. Understands how security issues can manifest in compilers — injection through input data, unsafe file path handling. | |
| Computer Vision Engineer | Familiar with key OWASP Top 10 vulnerabilities and understands their impact on CV services. Avoids injections when processing user images and metadata. | |
| Data Analyst | Familiar with key OWASP Top 10 vulnerabilities and understands their impact on analytical applications. Avoids SQL injection when writing database queries. | |
| Data Engineer | Understands security for data: data access control, PII handling, encryption basics. Applies secure practices when working with sensitive data. | |
| Data Scientist | Understands security for DS: data access control, model security basics. Protects sensitive training data. | |
| Database Engineer / DBA | Knows main OWASP Top 10 vulnerability categories, especially SQL injection. Understands basic database protection principles: parameterized queries, least privilege. | |
| Desktop Developer (.NET WPF/WinUI/MAUI) | Knows OWASP Desktop Application Security. Understands secure storage through Windows DPAPI (ProtectedData). Avoids hardcoded secrets. Validates user input in WPF/WinUI. | |
| Desktop Developer (Electron/Tauri) | Knows OWASP for Electron. Understands nodeIntegration risks. Uses contextIsolation. Validates input. Avoids eval and innerHTML. | |
| Desktop Developer (Qt/C++) | Knows OWASP Top 10 Desktop Risks. Understands secure credential storage through Qt Keychain. Avoids hardcoded secrets in Qt Resource files. Validates user input. | |
| DevOps Engineer | Understands basic OWASP Top 10 security principles in DevOps context. Scans Docker images for vulnerabilities using Trivy, checks dependencies through Dependabot. Follows security checklists when configuring CI/CD pipelines. | |
| DevSecOps Engineer | 必要 | Studies OWASP Top 10 vulnerabilities: SQL injections, XSS, CSRF, SSRF. Completes OWASP WebGoat and Juice Shop labs. Uses OWASP Cheat Sheets for understanding basic web application threats. Configures OWASP Dependency-Check locally for dependency analysis. |
| Embedded Developer | Knows basic security principles for embedded: secure boot concept, encrypted storage. Understands OWASP IoT Top 10 vulnerabilities. | |
| Flutter Developer | Knows key mobile vulnerabilities from OWASP Mobile Top 10. Applies basic security practices when developing Flutter apps — data protection and secure network requests. | |
| Frontend Developer (Angular) | Knows main web vulnerabilities from OWASP Top 10 — XSS, CSRF, and injections. Applies Angular's built-in XSS protection mechanisms through automatic sanitization. | |
| Frontend Developer (React) | 必要 | Understands main OWASP Top 10 vulnerabilities in the React context: XSS prevention through automatic JSX escaping, dangerouslySetInnerHTML dangers, CSRF tokens. Uses Content Security Policy headers in Next.js, validates user input. |
| Frontend Developer (Svelte) | Familiar with the main vulnerabilities from OWASP Top 10 in the context of frontend applications — XSS, CSRF. Understands basic methods for protecting Svelte components from injections. | |
| Frontend Developer (Vue) | 必要 | Understands basic web application vulnerabilities — XSS, CSRF and their prevention in Vue. Uses Vue 3 built-in XSS protection through automatic escaping in templates, avoids v-html with user data. |
| Fullstack Developer | Understands main OWASP threats for fullstack applications: XSS when rendering user data, SQL injection, CSRF. Applies basic protections: input sanitization on frontend and backend, parameterized queries, CSRF tokens. | |
| Game Designer | Knows main OWASP vulnerabilities and their applicability to game servers and services. Understands basic security principles: input validation, injection protection in game APIs. Recognizes the importance of protecting player data: accounts, payment information, progress. | |
| Game QA Engineer | Understands security for game QA: tests auth flows, cheat prevention, input validation. Verifies basic security requirements. | |
| Game Server Developer | Knows key OWASP Top 10 vulnerabilities and understands their risks for game servers. Aware of threats — SQL injection in APIs, XSS in chats, insecure serialization of game data. | |
| Infrastructure Engineer | Knows basic OWASP Top 10 categories in infrastructure context: injection attacks through config templates, sensitive data exposure in logs, server misconfiguration. Applies security checklists when configuring nginx/Apache web servers and understands security headers. | |
| iOS Developer | 必要 | Understands basic mobile application security principles per OWASP Mobile Top 10. Avoids storing sensitive data in UserDefaults and NSLog, uses HTTPS for all network requests. Knows main vulnerabilities: insecure data storage, weak authentication, and plaintext data transmission. |
| IoT Engineer | Understands OWASP IoT Top 10: weak passwords, insecure interfaces, lack of updates. Checks basic security vulnerabilities in IoT APIs. | |
| Language Tooling Engineer | Familiar with key OWASP Top 10 vulnerabilities and understands their relevance to language tools. Applies basic security checks when processing user code with parsers. | |
| LLM Engineer | Understands security for LLM: prompt injection awareness, data leakage prevention. Applies basic safety measures. | |
| ML Engineer | Knows main OWASP Top 10 categories and their applicability to ML services and model APIs. Understands ML system threats: adversarial attacks, model poisoning and training data leakage. | |
| MLOps Engineer | Knows the main OWASP Top 10 vulnerability categories. Understands ML system security specifics: protecting training data, secure storage of models, and inference endpoints. | |
| Network Engineer | Knows basic OWASP security concepts for network engineering and can apply them in typical tasks. Uses standard tools and follows established team practices. Understands when and why this approach is used. | |
| NLP Engineer | Familiar with core OWASP vulnerabilities and understands their applicability to NLP services. Applies basic security checks when processing user text data with models. | |
| Penetration Testing Engineer | 必要 | Understands basic OWASP and Application Security concepts. Follows security guidelines. Recognizes common vulnerabilities in code. |
| Performance Testing Engineer | Knows main OWASP Top 10 vulnerability categories. Understands the relationship between security and performance: DDoS attacks, rate limiting, security middleware impact on latency. | |
| Platform Engineer | Understands OWASP for platform: main web application vulnerabilities, secure defaults for platform services. Scans platform API for vulnerabilities. | |
| Product Manager | Understands basic security principles and their impact on user trust in the product. Knows the main OWASP vulnerabilities and can assess security risk when designing product features. Includes basic security requirements in user stories: validation, authentication. | |
| QA Automation Engineer | Knows main OWASP Top 10 vulnerabilities and understands their impact on application security. Writes basic tests for XSS, SQL injection, and insecure authentication checks. | |
| QA Engineer (Manual) | Learns about key OWASP Top 10 vulnerabilities and their impact on application security. Understands basic security testing principles and can identify common vulnerabilities during manual testing. | |
| QA Security Engineer | Knows OWASP Top 10: injection, broken auth, XSS, SSRF. Tests following the OWASP Testing Guide. Uses checklists for manual security testing. | |
| React Native Developer | Familiar with main OWASP Mobile Top 10 vulnerabilities and applies basic security checks. Understands risks of storing data on the device and uses secure storage in React Native. | |
| Release Engineer | Knows the main vulnerabilities from OWASP Top 10 and their impact on release processes. Checks basic security settings for deployment configurations and secrets in pipelines. | |
| Security Analyst | 必要 | Understands basic OWASP and Application Security concepts. Follows security guidelines. Recognizes common code vulnerabilities. |
| Site Reliability Engineer (SRE) | Understands basic security practices for infrastructure: principle of least privilege, secure defaults. Follows security runbooks. Monitors security alerts from CloudWatch/GuardDuty. | |
| Smart Contract Developer | Understands basic OWASP concepts applied to smart contract development — recognizes common vulnerabilities like reentrancy, front-running, and access control flaws. Follows security guidelines for Solidity/Vyper development including SWC registry patterns. Identifies basic code vulnerabilities during self-review. | |
| Solutions Architect | Understands OWASP for architecture: Top 10 vulnerabilities, security by design principles. Evaluates security implications of architectural decisions. | |
| Systems Programmer (C/C++) | Understands security for systems: buffer overflow prevention, secure memory management. Applies safe coding practices. | |
| Technical Product Manager | Knows main OWASP Top 10 vulnerability types and understands their potential impact on the product and users. Can include security requirements in user stories. | |
| Technical Writer | Understands main OWASP vulnerabilities and can document basic project security requirements. Knows security terminology for correctly describing authentication and authorization in API documentation. Creates simple security guidelines for developers within project documentation. | |
| Telecom Developer | Knows the main OWASP Top 10 categories and their applicability to telecom applications. Understands specific threats to SIP, SS7, and Diameter protocols in the telecommunications context. | |
| Unity Developer | Understands security for Unity: client-side security basics, anti-cheat awareness, secure communication. | |
| Unreal Engine Developer | Understands security for Unreal: client-side security, anti-cheat basics. Validates user input. | |
| XR Unity Developer | Knows main OWASP vulnerability categories and their applicability to XR applications. Understands risks associated with transmitting user data and biometrics through VR device network interfaces. |
| 角色 | 必要性 | 描述 |
|---|---|---|
| 1C Developer | Implements 1C web service protection based on OWASP recommendations: input validation, SQL injection protection, secure authentication. Conducts external connection audits. | |
| AI Product Engineer | Applies OWASP recommendations for protecting AI products from typical vulnerabilities, including prompt injection and data poisoning. Conducts basic security audits of API interfaces and implements input validation for ML models. | |
| Analytics Engineer | Applies OWASP recommendations to protect analytics pipelines and dashboards from common vulnerabilities. Implements input validation, parameterized queries, and proper access management for analytics resources. | |
| Android Developer | 必要 | Applies OWASP MASVS recommendations in Android development: reverse engineering protection via ProGuard, root detection via SafetyNet, data leakage prevention through clipboard and screenshots. Implements certificate pinning, configures Network Security Config for cleartext traffic restriction, performs basic security audits using MobSF and JADX. |
| Application Security Engineer | 必要 | Applies OWASP Top 10 and application security practices to secure development workflows. Conducts security-focused code reviews identifying injection, authentication, and access control vulnerabilities. Uses SAST/DAST tools (SonarQube, Burp Suite, OWASP ZAP) for automated vulnerability scanning and triage. |
| AR/VR Developer | Implements AR/VR application security following OWASP recommendations. Ensures secure transmission of tracking data, protection of user avatars, and encryption of voice chat. | |
| Backend Developer (C#/.NET) | Applies OWASP in .NET: security headers via middleware, rate limiting, input validation via FluentValidation. SAST through Roslyn Security analyzers. Masking in logs. | |
| Backend Developer (Elixir) | Implements OWASP vulnerability protection in Phoenix: configures Content Security Policy through Plug, prevents mass assignment through explicit cast in Ecto.Changeset. Implements rate limiting through Hammer, configures secure headers through put_resp_header in Plug pipeline. | |
| Backend Developer (Go) | Applies OWASP recommendations in Go services: injection protection via prepared statements, secure headers middleware in Gin/Chi, rate limiting. Configures gosec and staticcheck for vulnerability detection, implements input validation via go-playground/validator. | |
| Backend Developer (Java/Kotlin) | Applies OWASP recommendations in Java projects: security headers via Spring Security, rate limiting, input validation via Bean Validation. Runs SAST through SpotBugs Security. Handles sensitive data: encryption at rest, masking in logs. | |
| Backend Developer (Node.js) | Applies security in Node.js: helmet for HTTP headers, CORS configuration, input sanitization (DOMPurify). Tests: injection, broken auth, security misconfiguration. | |
| Backend Developer (PHP) | Secures applications: parameterized queries, output encoding, input validation, Content-Security-Policy. Configures CORS. Conducts basic security code review. Uses password_hash/password_verify. | |
| Backend Developer (Python) | 必要 | Applies protection against CSRF, SSRF, XXE. Configures security headers. Checks dependencies for vulnerabilities (pip-audit, safety). Handles sensitive data (masking, encryption). |
| Backend Developer (Rust) | Protects Rust services against OWASP Top 10: CSRF through double-submit cookies, SSRF through URL validation, broken authentication through argon2 hashing. Configures security headers through tower-http middleware and implements rate limiting through governor. | |
| Backend Developer (Scala) | Applies OWASP practices in Scala services: CSRF protection in Play Framework, CORS policy configuration in Akka HTTP, safe JSON deserialization through Circe. Implements input validation through refined types, prevents mass assignment and configures security headers for HTTP responses. | |
| BI Analyst | Applies data security principles when designing analytical reports and dashboards with PII. Implements row-level security and data masking for protecting confidential data in BI tools. Reviews SQL queries for injection vulnerabilities and ensures secure data access. | |
| Blockchain Developer | Applies OWASP principles and blockchain-specific security standards to DApp development. Conducts security code reviews of smart contracts and web3 frontend code identifying reentrancy, oracle manipulation, and cross-site scripting risks. Uses Slither, Mythril, and web application scanning tools for vulnerability detection. | |
| Cloud Engineer | 必要 | Applies security headers (CORS, CSP, X-Frame-Options). Protects against SSRF, path traversal, mass assignment. Uses input validation and sanitization. Configures rate limiting. Conducts basic security code review. |
| Compiler Engineer | Applies secure input processing principles in the compiler: source code validation, path traversal protection, safe plugin handling. Conducts basic security audits. | |
| Computer Vision Engineer | Applies OWASP recommendations when developing CV APIs — input image validation, adversarial attack protection, secure model storage. Configures rate limiting. | |
| Data Analyst | Applies OWASP recommendations when working with analytical web applications and APIs, validates user input in dashboards. Ensures secure storage of connection credentials. | |
| Data Engineer | Applies data security: column-level encryption, data masking, access control policies. Scans pipelines for security vulnerabilities. | |
| Data Scientist | Implements ML security: secure model serving, adversarial robustness, data privacy. Applies differential privacy. | |
| Database Engineer / DBA | Applies OWASP principles for database protection: configuring row-level security, encrypting sensitive data, access auditing. Performs regular privilege analysis and removes excessive permissions. | |
| Desktop Developer (.NET WPF/WinUI/MAUI) | Applies OWASP for .NET desktop: secure communication (HttpClient + TLS), input validation through DataAnnotations, secure logging. Configures code signing through Authenticode. Conducts security self-review. | |
| Desktop Developer (Electron/Tauri) | Applies OWASP for Electron: CSP, HTTPS enforcement, secure IPC. Audits dependencies through npm audit. Configures Electron Fuses. | |
| Desktop Developer (Qt/C++) | Applies OWASP recommendations for desktop: secure storage, secure communication (QSslSocket), input sanitization. Configures Content Security Policy for QWebEngine. Conducts security self-review. | |
| DevOps Engineer | Integrates SAST/DAST tools into CI/CD pipelines: SonarQube, Snyk, OWASP ZAP. Configures automated image and dependency scanning, implements security quality gates. Manages secrets through environment variables and vault. | |
| DevSecOps Engineer | 必要 | Introduces OWASP ASVS as application security verification standard. Conducts code review against OWASP Top 10. Configures OWASP ZAP for automated DAST scanning in CI/CD. Applies OWASP Testing Guide for systematic web application vulnerability testing. |
| Embedded Developer | Applies OWASP IoT guidelines: secure firmware update, encrypted communication, secure credential storage in MCU Secure Element. | |
| Engineering Manager | Applies OWASP security practices to team development workflows — ensures security reviews are part of definition of done. Conducts security-aware code reviews and coordinates team adherence to security scanning policies. Uses organizational SAST/DAST tooling reports to prioritize security debt remediation. | |
| Flutter Developer | Integrates OWASP checks into the Flutter app development process. Implements certificate pinning, secure token storage, and reverse engineering protection in Dart code. | |
| Frontend Developer (Angular) | Implements comprehensive Angular application protection following OWASP recommendations. Configures CSP headers, CORS policies, and secure user input handling. | |
| Frontend Developer (React) | 必要 | Applies OWASP recommendations in React/Next.js applications: security headers configuration (CSP, HSTS, X-Frame-Options) through next.config.js, secure authentication through NextAuth.js, API route protection from injection. Conducts security code review, uses npm audit. |
| Frontend Developer (Svelte) | Applies OWASP recommendations when developing Svelte applications, configures CSP headers and user input sanitization. Conducts security reviews of frontend code. | |
| Frontend Developer (Vue) | 必要 | Implements Vue application protection against OWASP Top 10 — CSP headers in Nuxt, user input sanitization, secure cookie configuration. Configures Nuxt Security module, conducts dependency audit through npm audit. |
| Fullstack Developer | Implements fullstack application protection per OWASP Top 10: Content Security Policy for frontend, rate limiting on API, SSRF and path traversal protection on backend. Configures security headers, validates input on both layers and logs security incidents. | |
| Game Designer | Applies OWASP Top 10 when designing game servers and APIs: protection against XSS, CSRF, SQL injection. Implements secure player authentication and protection against game data manipulation. Conducts basic security review of game endpoints and client-server protocol. | |
| Game QA Engineer | Tests game security: cheat detection, packet manipulation, memory exploitation. Automates security testing. | |
| Game Server Developer | Applies OWASP recommendations when developing server APIs — client input validation, replay attack protection, secure payment data handling in the game store. | |
| Infrastructure Engineer | Applies OWASP recommendations when configuring infrastructure: WAF rule configuration in CloudFront/Cloudflare, web server hardening per CIS benchmarks, CSP and HSTS header configuration. Automates security scanning of infrastructure endpoints through OWASP ZAP in CI pipelines. | |
| iOS Developer | 必要 | Applies OWASP Mobile Security recommendations for iOS development: reverse engineering protection, secure Keychain data storage, injection prevention. Conducts independent code security audits, checks for data leaks via IPC and clipboard. Implements certificate pinning and man-in-the-middle attack protection. |
| IoT Engineer | Applies OWASP IoT Top 10 for security review of IoT products. Conducts security testing: protocol fuzzing, firmware analysis. Configures SAST for IoT code. | |
| Language Tooling Engineer | Integrates OWASP checks into language tools for identifying vulnerabilities in analyzed code. Implements secure input handling in LSP servers and linters. | |
| LLM Engineer | Implements LLM security: prompt injection defense, output filtering, PII detection. Deploys guardrails. | |
| ML Engineer | Applies OWASP recommendations when developing ML model APIs: input validation, rate limiting, injection protection. Introduces security checks for model input data and training pipeline. | |
| MLOps Engineer | Applies security principles to ML infrastructure: protecting model APIs from injections, secure training data transmission, access control for model registry and experiment tracking. | |
| Network Engineer | Confidently applies OWASP security for network engineering in non-standard tasks. Independently selects the optimal approach and tools. Analyzes trade-offs and proposes improvements to existing solutions. | |
| NLP Engineer | Implements NLP service protection against injections and adversarial attacks based on OWASP recommendations. Validates input data, protects against prompt injection, and ensures API security. | |
| Penetration Testing Engineer | 必要 | Applies OWASP Testing Guide methodology for web application penetration testing. Conducts security assessments identifying OWASP Top 10 vulnerabilities with manual exploitation techniques. Uses specialized tools (Burp Suite Professional, sqlmap, custom scripts) for deep vulnerability validation and proof-of-concept development. |
| Performance Testing Engineer | Conducts security-oriented performance tests: stress-testing rate limiter and WAF, measuring TLS/encryption overhead, testing resilience against DDoS load patterns. | |
| Platform Engineer | Applies OWASP in platform context: secure API design, input validation for admission webhooks, authentication/authorization for platform services. | |
| Product Manager | Defines security requirements for product features considering OWASP Top 10 and compliance. Designs user experience for security-sensitive functions: 2FA, data export, privacy settings. Assesses security risk of new features and includes mitigation in product planning. | |
| QA Automation Engineer | Develops automated security tests based on OWASP — checking security headers, testing authentication and authorization, fuzzing API input parameters. | |
| QA Engineer (Manual) | Applies OWASP and application security in daily work. Conducts security code review. Uses scanning and analysis tools. | |
| QA Security Engineer | Tests against OWASP Top 10: automated scanning (ZAP), manual verification for complex scenarios. Understands OWASP ASVS for security requirements. Documents findings using CVSS. | |
| React Native Developer | Applies OWASP recommendations for protecting React Native applications: SSL pinning, secure token storage, code obfuscation. Audits dependencies for known vulnerabilities. | |
| Release Engineer | Integrates OWASP security checks into release pipelines. Configures automated scanning of dependencies and container images for vulnerabilities before each release. | |
| Security Analyst | 必要 | Applies OWASP security knowledge for security event analysis and threat correlation. Conducts security reviews of application logs identifying exploitation attempts for OWASP Top 10 vulnerabilities. Uses SIEM rules and detection logic to identify application-layer attacks and suspicious authentication patterns. |
| Site Reliability Engineer (SRE) | Applies security in infrastructure: hardening guides for OS and containers, security scanning in CI (Trivy, Snyk), audit logging. Configures WAF rules and responds to security alerts. | |
| Smart Contract Developer | Applies OWASP principles and SWC (Smart Contract Weakness Classification) standards to contract development. Conducts security code reviews identifying reentrancy, access control flaws, and economic exploitation vectors. Uses Slither, Mythril, and Echidna for automated vulnerability detection and property-based testing. | |
| Solutions Architect | Applies OWASP in architecture: threat modeling, secure design patterns, defense-in-depth. Designs security layers in architecture. | |
| Systems Programmer (C/C++) | Implements system security: ASLR-aware code, stack canaries, secure IPC. Conducts security-focused code review. | |
| Technical Lead | Applies OWASP security practices across team development workflows — integrates security scanning into CI/CD pipelines, ensures OWASP Top 10 coverage in code reviews, and coordinates vulnerability remediation priorities. Uses SAST/DAST tools and dependency vulnerability scanners to maintain security baseline. | |
| Technical Product Manager | Considers OWASP recommendations when designing features — secure authentication, user data protection, input validation. Prioritizes security tasks in the product backlog. | |
| Technical Writer | Documents project security architecture: threat model, security controls, compliance requirements. Creates secure development guides based on OWASP Top 10 for the development team. Describes security review and vulnerability management procedures in operational documentation. | |
| Telecom Developer | Applies OWASP recommendations when developing telecom portals and APIs: protection against SIP header injections, XSS in web interfaces. Implements security tests for telecom protocols in CI/CD pipeline. | |
| Unity Developer | Implements game security: secure API communication, client validation, anti-tampering. Checks for cheating vectors. | |
| Unreal Engine Developer | Implements game security: encrypted communication, server authority, anti-tampering measures. | |
| XR Unity Developer | Applies OWASP principles when developing network components of XR applications: input validation, API call protection. Implements secure storage of tokens and user data on XR devices. |
| 角色 | 必要性 | 描述 |
|---|---|---|
| 1C Developer | Designs 1C solution security model based on OWASP recommendations. Implements integration point protection, access rights auditing, and sensitive data encryption in databases. | |
| AI Product Engineer | Integrates OWASP practices into the AI product lifecycle, including protection against adversarial attacks and training data leaks. Designs multi-layer ML pipeline protection with automatic dependency scanning and anomaly monitoring. | |
| Analytics Engineer | Integrates OWASP practices into the analytics system lifecycle — data warehouse protection, auditing access to sensitive data. Architects multi-layered analytics platform security with PII masking and column-level security. | |
| Android Developer | 必要 | Ensures OWASP MASVS-L2 compliance for Android applications: full audit against MASVS checklist, anti-tampering protection implementation, runtime application self-protection (RASP). Configures obfuscation via R8 with custom rules, implements jailbreak/root detection with graceful degradation, conducts threat modeling for mobile attack vectors, integrates SAST/DAST into CI pipeline. |
| Application Security Engineer | 必要 | Designs enterprise application security programs aligned with OWASP frameworks — implements secure development lifecycle practices, threat modeling methodologies, and automated security pipeline integration. Conducts architectural-level threat modeling for complex systems. Mentors team on security architecture patterns and vulnerability root cause analysis. |
| AR/VR Developer | Architects the AR/VR platform security considering XR-specific threats. Develops protection against spatial injection, environment spoofing, and unauthorized sensor access. | |
| Backend Developer (C#/.NET) | 必要 | Designs security architecture: threat modeling (STRIDE), SAST/DAST in CI, dependency scanning (Snyk/Dependabot). Implements security-as-code via ASP.NET Core middleware pipeline. |
| Backend Developer (Elixir) | 必要 | Designs comprehensive OWASP threat protection for Elixir services. Implements SAST through Sobelow for static analysis of Phoenix code, configures WAF rules. Implements protection against SSRF, deserialization attacks through safe :erlang.binary_to_term with [:safe] option. |
| Backend Developer (Go) | 必要 | Designs Go service protection per OWASP: API threat modeling, WAF rules, security headers, CSP. Implements dependency scanning via govulncheck, configures SAST/DAST in CI pipeline, conducts security code review for the team. |
| Backend Developer (Java/Kotlin) | 必要 | Designs Java platform security architecture following OWASP: threat modeling (STRIDE), security testing in CI (OWASP ZAP, Snyk), dependency vulnerability scanning. Implements security-as-code via Spring Security DSL. |
| Backend Developer (Node.js) | 必要 | Designs Node.js security: security middleware pipeline, automated vulnerability scanning in CI, dependency audit automation. Implements security logging and threat detection. |
| Backend Developer (PHP) | 必要 | Conducts security audits: identifies injection points, broken access control, insecure deserialization. Configures security headers. Implements rate limiting for brute-force protection. Automates SAST/DAST in CI. |
| Backend Developer (Python) | 必要 | Conducts security code reviews. Configures SAST/DAST scanning. Designs security-first architecture. Implements defense in depth. |
| Backend Developer (Rust) | 必要 | Designs Rust service protection against complex attacks: deserialization vulnerabilities in serde (deny_unknown_fields), timing attacks through constant_time_eq, supply chain through cargo-vet. Conducts threat modeling and implements SAST through cargo-audit and cargo-deny in CI pipeline. |
| Backend Developer (Scala) | 必要 | Conducts security review of Scala services against OWASP Top 10: dependency analysis through sbt-dependency-check, code scanning through Snyk/SonarQube. Implements protection against SSRF, ReDoS and deserialization attacks, configures Content Security Policy and designs secure APIs with rate limiting. |
| BI Analyst | Designs data security architecture for the analytical platform: access control, encryption, audit. Implements data governance policies: data classification, retention, anonymization for compliance. Develops security review process for analytical models and reports. | |
| Blockchain Developer | 必要 | Designs security solutions with OWASP and application security. Conducts threat modeling. Introduces security practices into SDLC. Mentors the team. |
| Cloud Engineer | 必要 | Designs application security architecture. Conducts threat modeling (STRIDE). Introduces security testing in CI (SAST/DAST). Designs secure defaults. Runs vulnerability management process. Trains the team on secure development. |
| Compiler Engineer | Analyzes compiler attack surface: untrusted code processing, macro sandboxing, protection against supply chain attacks through dependencies. Introduces fuzzing for discovering parser vulnerabilities. | |
| Computer Vision Engineer | Conducts security analysis of CV systems using OWASP methodology, including protection against model extraction and data poisoning. Implements SAST/DAST for ML services and inference endpoints. | |
| Data Analyst | Conducts security analysis of analytical systems using OWASP methodology, identifies and eliminates vulnerabilities in data processing pipelines. Implements SAST and DAST in CI/CD processes. | |
| Data Engineer | Designs secure data platform: data classification, automated PII detection, encryption architecture. Implements security in data CI/CD. | |
| Data Scientist | Designs ML security: model security architecture, adversarial defense, data protection pipelines. | |
| Database Engineer / DBA | Designs comprehensive database security: TDE for data encryption, dynamic masking, SQL injection detection at WAF level, anomalous access pattern monitoring. | |
| Desktop Developer (.NET WPF/WinUI/MAUI) | 必要 | Designs security architecture for .NET desktop. Implements secure update with Authenticode verification. Introduces AppContainer sandboxing. Conducts threat modeling. |
| Desktop Developer (Electron/Tauri) | 必要 | Designs security architecture for Electron. Implements defense-in-depth. Conducts threat modeling. Configures code signing and notarization for 3 platforms. |
| Desktop Developer (Qt/C++) | 必要 | Designs security architecture for Qt applications. Implements secure update channel with code signing verification. Introduces sandboxing through OS-level mechanisms. Conducts threat modeling for desktop. |
| DevOps Engineer | 必要 | Designs DevSecOps pipelines: automated scanning at all CI/CD stages, policy-as-code through OPA/Gatekeeper, infrastructure compliance checks. Implements shift-left security, configures SBOM generation and vulnerability management. |
| DevSecOps Engineer | 必要 | Develops corporate security program based on OWASP SAMM. Configures OWASP ZAP in full scan mode with custom rules for business logic. Introduces OWASP Threat Dragon for threat modeling. Conducts OWASP Top 10 training for developers. |
| Embedded Developer | Implements security-by-design: hardware root of trust, secure boot chain, firmware encryption and signing, OTP key provisioning. | |
| Engineering Manager | 必要 | Designs security practices integration into team SDLC — implements threat modeling workshops, security champion programs, and automated security gate enforcement. Conducts organizational-level threat modeling for product architectures. Mentors team on security-first development culture and vulnerability management processes. |
| Flutter Developer | Designs comprehensive Flutter app security strategy based on OWASP recommendations. Automates security testing and implements root/jailbreak detection protection. | |
| Frontend Developer (Angular) | Designs Angular application security architecture based on OWASP ASVS. Automates dependency scanning and integrates DAST testing into the CI/CD pipeline. | |
| Frontend Developer (React) | 必要 | Designs security architecture for React applications following OWASP: authentication and authorization strategy, SSRF protection in Server Components, secure cookie management. Introduces automated security scanning in CI (Snyk, SAST), defines threat model for frontend applications. |
| Frontend Developer (Svelte) | Implements comprehensive security practices in Svelte projects based on OWASP guidelines, including frontend SAST. Designs secure handling of sensitive data. | |
| Frontend Developer (Vue) | 必要 | Designs security system for Vue applications — security headers via Nitro middleware, auth flow with PKCE, subresource integrity. Conducts component security review, introduces automated vulnerability scanning in CI pipeline. |
| Fullstack Developer | 必要 | Designs fullstack application security: defense-in-depth from frontend to database, WAF configuration, automated dependency audit. Conducts security code reviews, configures SAST/DAST in CI and implements secure coding practices across the entire stack. |
| Game Designer | Designs game system security architecture considering specifics: anti-cheat, economy protection, DRM. Implements security testing in CI/CD pipeline and conducts threat modeling for game subsystems. Develops protection against game-specific threats: speed hacking, item duplication, memory tampering. | |
| Game QA Engineer | Designs security testing strategy: penetration testing games, anti-cheat validation, economy exploitation testing. | |
| Game Server Developer | Designs game server protection systems against typical attacks — speed hacks, memory manipulation, packet forgery. Implements server-side validation of all client actions and anti-cheat mechanisms. | |
| Infrastructure Engineer | 必要 | Designs infrastructure protection against OWASP vulnerabilities: multi-layer WAF with custom rules, rate limiting at ALB and nginx level, SSRF protection through network segmentation. Implements automatic DAST scanning for infrastructure services and configures ModSecurity with OWASP Core Rule Set. |
| iOS Developer | 必要 | Integrates OWASP MASVS (Mobile Application Security Verification Standard) into the iOS development process: systematic verification at L1 and L2 levels. Conducts threat modeling for mobile applications, uses OWASP Mobile Security Testing Guide for penetration testing. Configures automatic security checks in CI/CD and trains the team on secure practices. |
| IoT Engineer | 必要 | Designs security controls for IoT platform based on OWASP. Implements secure development lifecycle for IoT. Conducts threat modeling of IoT systems. |
| Language Tooling Engineer | Designs static security analysis modules based on OWASP for language tools. Develops vulnerability detection rules integrated into IDEs through language servers. | |
| LLM Engineer | Designs LLM security: comprehensive prompt security, adversarial testing, data classification. | |
| ML Engineer | Designs comprehensive ML platform protection per OWASP ML Top 10: model security, data poisoning prevention, inference attacks. Introduces adversarial robustness testing and differential privacy for training data protection. | |
| MLOps Engineer | Architects secure MLOps infrastructure: protection against adversarial attacks, secure model serving, training data access audit. Implements ML library dependency scanning. | |
| Network Engineer | Expertly applies OWASP security for network engineering to design complex systems. Optimizes existing solutions and prevents architectural mistakes. Conducts code reviews and trains colleagues on best practices. | |
| NLP Engineer | Designs NLP system security model considering specific threats: data poisoning, model extraction, adversarial inputs. Implements prompt injection protection at architecture level. | |
| Penetration Testing Engineer | 必要 | Designs comprehensive application security assessment methodologies beyond OWASP Top 10 — identifies business logic flaws, authentication bypass chains, and complex multi-step exploitation scenarios. Conducts threat modeling for application architectures and integrates penetration testing into SDLC pipelines. Mentors team on advanced exploitation techniques and responsible disclosure. |
| Performance Testing Engineer | Designs tests at the intersection of security and performance: benchmarking impact of various security controls, testing AuthN/AuthZ under load, production-like security in test environments. | |
| Platform Engineer | Designs secure platform: OWASP guidelines for multi-tenant platform, security scanning pipeline, vulnerability management for platform components. | |
| Product Manager | Defines product security strategy: threat modeling, security features roadmap, compliance requirements. Designs privacy-by-design and security-by-design approaches to product development. Balances security requirements with usability for optimal user experience. | |
| QA Automation Engineer | Designs automated security testing strategy — DAST/SAST integration in CI, automatic fuzzing, business logic vulnerability testing, OWASP ZAP pipelines. | |
| QA Engineer (Manual) | 必要 | Designs security testing approaches integrated with QA workflows — implements OWASP-based security test checklists for manual testing, establishes security regression scenarios, and conducts exploratory security testing for authentication and authorization flows. Mentors team on security-aware testing practices and vulnerability identification during functional testing. |
| QA Security Engineer | 必要 | Designs OWASP-based testing program: ASVS compliance verification, automated OWASP checks in CI, risk-based testing by OWASP categories. Maintains regression test suite per OWASP. |
| React Native Developer | Architects comprehensive security model for React Native applications based on OWASP. Implements reverse engineering protection, root/jailbreak detection, and runtime integrity checks. | |
| Release Engineer | Designs comprehensive security gates in release processes based on OWASP recommendations. Automates release blocking when critical dependency vulnerabilities are detected. | |
| Security Analyst | 必要 | Designs application security monitoring and detection strategies aligned with OWASP attack patterns. Conducts threat modeling for detection engineering — designing correlation rules for multi-stage application attacks. Integrates security findings from SAST/DAST/pentest into SOC detection capabilities. Mentors team on application-layer threat analysis and incident forensics. |
| Site Reliability Engineer (SRE) | 必要 | Designs infrastructure security: network segmentation, runtime protection (Falco), vulnerability management pipeline. Implements security-as-code: policy enforcement, compliance scanning. |
| Smart Contract Developer | 必要 | Designs security audit methodologies for DeFi protocol ecosystems — identifies complex economic attack vectors, cross-contract exploitation chains, and governance manipulation risks. Conducts threat modeling for smart contract architectures and implements security practices in Solidity/Vyper SDLC. Mentors team on formal verification approaches and adversarial testing for financial contracts. |
| Solutions Architect | Designs secure architecture: OWASP SAMM compliance, security architecture framework, automated security validation. | |
| Systems Programmer (C/C++) | Designs secure systems: memory safety architecture, kernel security, secure boot. | |
| Technical Lead | 必要 | Designs team-level security practices integration into development workflows — implements threat modeling as part of design process, automated security gates in deployment pipelines, and dependency vulnerability management. Conducts architectural threat modeling and security design reviews. Mentors team on secure coding patterns and OWASP-aware development practices. |
| Technical Product Manager | Integrates security into the product process — threat modeling at the discovery stage, security requirements in definition of done, regular audits. Evaluates business risks of vulnerabilities. | |
| Technical Writer | Designs security documentation standards for the organization: threat models, security policies, compliance docs. Creates in-depth application security guides tied to specific product technologies. Implements automatic security documentation generation from security scanning tools. | |
| Telecom Developer | Designs comprehensive telecom platform protection per OWASP: API security for BSS/OSS, toll fraud and SIP fuzzing protection. Implements automatic anomaly detection in signaling protocol traffic. | |
| Unity Developer | Designs game security architecture: anti-cheat systems, server-authoritative design, encryption. | |
| Unreal Engine Developer | Designs security architecture: comprehensive anti-cheat, server-authoritative design. | |
| XR Unity Developer | Conducts threat analysis for XR applications considering specifics: biometric data, spatial tracking, multi-user interaction. Introduces vulnerability protection at architecture level. |
| 角色 | 必要性 | 描述 |
|---|---|---|
| 1C Developer | Defines security strategy for all 1C projects in the organization based on OWASP. Coordinates security reviews and ensures compliance with standards during development and operations. | |
| AI Product Engineer | Shapes AI product security policy based on OWASP AI Security Guidelines, implements threat modeling for ML systems. Coordinates model security reviews and ensures compliance with security standards at all development stages. | |
| Analytics Engineer | Establishes the analytics platform security policy based on OWASP recommendations. Coordinates security reviews of analytics pipelines and ensures data protection compliance across all processing stages. | |
| Application Security Engineer | 必要 | Defines application security strategy aligned with OWASP frameworks across product portfolios. Establishes security policies for secure SDLC, vulnerability management SLAs, and security training programs. Coordinates cross-team incident response for application security breaches and trains development teams on threat modeling. |
| AR/VR Developer | Establishes security standards for AR/VR applications based on OWASP. Conducts security reviews of XR components and trains the team on protecting immersive applications. | |
| Backend Developer (C#/.NET) | 必要 | Defines security standards: OWASP compliance checklist, security review process, incident response. Trains on secure coding. |
| Backend Developer (Elixir) | 必要 | Defines OWASP security standards for all organizational Elixir services. Implements mandatory Sobelow in CI, conducts threat modeling for Phoenix applications. Designs security middleware through Plug for centralized protection, organizes regular security code reviews. |
| Backend Developer (Go) | 必要 | Defines OWASP security standards for the Go team: mandatory gosec + govulncheck in CI, dependency update policies, security review process. Coordinates penetration testing, implements security champions program and team training. |
| Backend Developer (Java/Kotlin) | 必要 | Defines team security standards: OWASP compliance checklist, security review process, incident response plan. Conducts security-focused code reviews. Trains developers on secure coding practices. |
| Backend Developer (Node.js) | 必要 | Defines security standards: mandatory security middleware, dependency scanning SLA, security review for new endpoints. Coordinates with security team. |
| Backend Developer (PHP) | 必要 | Defines security standards for the team: secure coding guidelines, mandatory security review, dependency scanning. Coordinates vulnerability remediation. Trains the team on secure development. |
| Backend Developer (Python) | 必要 | Defines security practices for the organization. Conducts threat modeling. Implements security training. Coordinates with security team. |
| Backend Developer (Rust) | 必要 | Defines security standards for Rust platform: mandatory cargo-audit/cargo-deny in CI, security review for unsafe blocks, dependency vetting through cargo-vet. Develops security middleware stack and implements automated penetration testing. |
| Backend Developer (Scala) | 必要 | Defines OWASP security standards for Scala team: mandatory security checks in CI, code review checklist, vulnerability management. Implements SAST/DAST tools for sbt projects, conducts threat modeling for new services and defines CVE response process. |
| BI Analyst | Defines data security strategy for the entire BI team: policies, tools, compliance requirements. Standardizes approaches to data protection in analytical systems and dashboards. Coordinates with the security team on audits and compliance checks for the BI platform. | |
| Blockchain Developer | 必要 | Defines security strategy for blockchain development spanning smart contracts, DApp frontends, and infrastructure. Establishes security policies for contract audit requirements, web3 security standards, and DeFi-specific threat modeling practices. Coordinates security incident response and trains teams on blockchain-specific vulnerability patterns. |
| Compiler Engineer | Defines security policy for compiler products: threat modeling, security review processes, CVE response. Coordinates security audits with external researchers. | |
| Computer Vision Engineer | Defines CV application security policies based on OWASP guidelines, including model intellectual property protection. Organizes ML infrastructure security audits. | |
| Data Analyst | Defines security policies for analytical applications based on OWASP guidelines, organizes regular audits. Trains the team in secure data and API handling practices. | |
| Data Engineer | Defines data security standards: GDPR/compliance requirements, data protection policies, security review process. | |
| Data Scientist | Defines ML security standards: model security requirements, data privacy policies, security review. | |
| Database Engineer / DBA | Defines data security policy: data classification standards, access audit processes, security incident response, GDPR/PCI-DSS compliance at the DBMS level. | |
| Desktop Developer (.NET WPF/WinUI/MAUI) | 必要 | Defines security strategy for .NET desktop team. Establishes security guidelines. Coordinates security audit and penetration testing. |
| Desktop Developer (Electron/Tauri) | 必要 | Defines security strategy for the Electron team. Establishes security review process. Coordinates security audits. |
| Desktop Developer (Qt/C++) | 必要 | Defines security strategy for the desktop team. Establishes security guidelines and checklist. Coordinates security review and penetration testing. |
| DevOps Engineer | 必要 | Defines organizational DevSecOps strategy: CI/CD security standards, production image admission policies, automated compliance. Implements security-as-code approach, designs centralized vulnerability and security incident management system. |
| DevSecOps Engineer | 必要 | Defines application security strategy based on OWASP SAMM with maturity metrics per domain. Integrates OWASP ASVS Level 2-3 into SDLC. Manages Bug Bounty program with OWASP classification. Builds Security Champions culture in development teams. |
| Embedded Developer | Defines security strategy for embedded products. Establishes threat model based on OWASP IoT, conducts firmware security reviews. | |
| Engineering Manager | 必要 | Defines security strategy for engineering organization development practices. Establishes security policies for SDLC integration, security champion programs, and vulnerability remediation timelines. Coordinates incident response processes and trains engineering teams on security-first development culture. |
| Flutter Developer | Establishes OWASP-based mobile app security standards for the Flutter team. Conducts security reviews and trains developers on mobile app protection practices. | |
| Frontend Developer (Angular) | Establishes OWASP-based frontend security standards for all Angular projects. Conducts security reviews of components and trains the team on secure development practices. | |
| Frontend Developer (Svelte) | Defines frontend security policies based on OWASP for the team, organizes security audits. Coordinates vulnerability remediation and developer training. | |
| Fullstack Developer | 必要 | Defines security strategy for the fullstack platform: threat modeling for new features, security checklists for review, automated CI/CD checks. Trains the team on OWASP, coordinates penetration testing and incident response. |
| Game Designer | Defines security strategy for the entire game project: servers, clients, infrastructure. Standardizes security practices across the team and conducts regular architecture security reviews. Coordinates with the security team and manages the vulnerability disclosure process. | |
| Game QA Engineer | Defines security testing standards: mandatory security tests, anti-cheat validation, vulnerability response. | |
| Game Server Developer | Defines security strategy for the game server stack. Conducts threat modeling, organizes regular security audits, and coordinates incident response related to cheating. | |
| Infrastructure Engineer | 必要 | Defines application security standards at infrastructure level: WAF policies for all public endpoints, security header standards, vulnerability response process. Reviews team security configurations and implements continuous security testing in infrastructure pipelines. |
| IoT Engineer | 必要 | Defines OWASP security standards for the IoT organization. Establishes security training and awareness program for IoT engineers. |
| Language Tooling Engineer | Defines OWASP check integration strategy for all organizational language tools. Coordinates security linter development and ensures coverage of all vulnerability categories. | |
| LLM Engineer | Defines LLM security standards: mandatory safety testing, guardrails requirements, security review. | |
| ML Engineer | Defines security baseline for organizational ML systems based on OWASP ML Security and MITRE ATLAS framework. Designs ML pipeline protection architecture: secure training, model signing and inference monitoring. | |
| MLOps Engineer | Defines the ML platform security policy: threat modeling for ML pipelines, standards for protecting training data, security review processes for model deployment to production. | |
| Network Engineer | Establishes OWASP security standards for the network engineering team and makes architectural decisions. Defines the technical roadmap incorporating this skill. Mentors senior engineers and influences practices of adjacent teams. | |
| NLP Engineer | Defines security strategy for all organizational NLP projects. Coordinates threat modeling for ML systems and ensures OWASP compliance for AI applications. | |
| Penetration Testing Engineer | 必要 | Defines penetration testing strategy and application security assessment programs across the organization. Establishes security testing policies, red team exercise frameworks, and vulnerability disclosure processes. Coordinates large-scale security assessments and trains teams on advanced attack simulation methodologies. |
| Performance Testing Engineer | Defines security performance testing strategy: mandatory security overhead testing per release, standards for conducting load tests securely, compliance checks. | |
| Platform Engineer | Defines platform security standards: OWASP compliance requirements, security testing pipeline, vulnerability response process. Conducts security reviews. | |
| Product Manager | Defines security and compliance strategy for the product portfolio at the project level. Standardizes security requirements in the product development process for all teams. Coordinates with the security team on prioritizing security initiatives in the product roadmap. | |
| QA Automation Engineer | Defines security testing standards for the automation team. Coordinates with security engineers, implements mandatory security checks in CI/CD, and trains QA engineers. | |
| QA Engineer (Manual) | 必要 | Defines security testing strategy based on OWASP guidelines at the team/product level. Establishes security test standards and coordinates regular security assessments. |
| QA Security Engineer | 必要 | Defines OWASP testing standards: mandatory checks per release, ASVS compliance level requirements, training program. Coordinates OWASP adoption in development. |
| React Native Developer | Defines the mobile security strategy for all organizational React Native projects. Coordinates security review processes and ensures compliance with OWASP Mobile standards. | |
| Release Engineer | Establishes security standards for release processes based on OWASP for all teams. Coordinates implementation of security-first approach in CI/CD with the information security team. | |
| Security Analyst | 必要 | Defines security monitoring strategy for application-layer threat detection across the organization. Establishes security analysis policies, detection engineering standards, and application security incident response playbooks. Coordinates cross-team security event investigation and trains analysts on OWASP-based threat analysis. |
| Site Reliability Engineer (SRE) | 必要 | Defines infrastructure security standards: hardening baselines, vulnerability SLA, security monitoring requirements. Coordinates with security team. Conducts threat modeling for infrastructure. |
| Smart Contract Developer | 必要 | Defines security strategy for smart contract development spanning protocol design, audit processes, and deployment safeguards. Establishes security policies for formal verification requirements, economic simulation testing, and vulnerability bounty programs. Coordinates security incident response for DeFi protocols and trains teams on adversarial thinking for financial contracts. |
| Solutions Architect | Defines security architecture standards: OWASP compliance requirements, threat modeling process, security review criteria. | |
| Systems Programmer (C/C++) | Defines system security standards: memory safety requirements, security review, vulnerability management. | |
| Technical Lead | 必要 | Defines security strategy for product development workflows across team boundaries. Establishes security policies for threat modeling requirements, security gate automation, and dependency vulnerability management. Coordinates cross-team security reviews and trains development teams on OWASP-aware architecture design. |
| Technical Product Manager | Defines product security strategy — compliance requirements, personal data processing policy, incident response process. Communicates risks to stakeholders. | |
| Technical Writer | Defines corporate security documentation standards for all organizational projects. Coordinates creation of a unified security knowledge base and compliance documentation repository. Implements documentation-driven security approach with automated freshness checks. | |
| Telecom Developer | Defines security baseline for telecom systems based on OWASP and industry standards GSMA and 3GPP. Designs protection architecture against infrastructure attacks: DDoS, spoofing, session hijacking. | |
| Unity Developer | Defines security standards: game security guidelines, anti-cheat requirements, security review. | |
| Unreal Engine Developer | Defines security standards: game security guidelines, anti-cheat requirements. | |
| XR Unity Developer | Defines security policy for XR projects based on OWASP, adapted for immersive technologies. Organizes security reviews and team training considering unique XR platform risks. |
| 角色 | 必要性 | 描述 |
|---|---|---|
| 1C Developer | Shapes organizational security standards for the 1C platform. Defines audit and protection methodologies ensuring security of all company 1C systems and integrations. | |
| AI Product Engineer | Defines corporate AI product security strategy, integrating OWASP recommendations with industry standards for ML system protection. Influences industry AI security practices through publications and working group participation. | |
| Analytics Engineer | Defines the corporate analytics system security strategy, integrating OWASP with industry data protection standards. Influences data governance architecture considering GDPR, SOC2, and industry regulator requirements. | |
| Application Security Engineer | 必要 | Defines enterprise application security strategy shaping security architecture across all product domains. Coordinates organizational compliance programs (SOC2, ISO 27001, PCI DSS) integrating OWASP frameworks. Represents the organization in security communities and drives industry-level security standards adoption. |
| AR/VR Developer | Defines organizational security policy for AR/VR products. Creates an XR-specific security framework with spatial and biometric data privacy protection. | |
| Backend Developer (C#/.NET) | 必要 | Shapes security program: OWASP SAMM assessment, security champions, bug bounty. Defines governance for all .NET services. |
| Backend Developer (Elixir) | 必要 | Develops security strategy at the entire Elixir platform level. Defines security framework with Sobelow, mix audit and Plug middleware for all services. Designs automated vulnerability detection system, implements DevSecOps culture in Elixir development. |
| Backend Developer (Go) | 必要 | Shapes organizational OWASP-based security strategy for Go platform: secure SDLC standards, automated security gates in CI/CD, bug bounty program. Develops platform security libraries and tools for proactive vulnerability detection. |
| Backend Developer (Java/Kotlin) | 必要 | Shapes organizational security program: OWASP SAMM assessment, security champions program, bug bounty. Defines security governance for all Java services. |
| Backend Developer (Node.js) | 必要 | Designs Node.js platform security strategy: secure-by-default framework, automated security verification, supply chain security. Defines organizational AppSec standards. |
| Backend Developer (PHP) | 必要 | Shapes organizational security strategy: security architecture, penetration testing program, incident response plan. Defines compliance requirements and security baseline for all services. |
| Backend Developer (Python) | 必要 | Shapes security strategy. Defines security standards. Evaluates compliance requirements. Builds security culture. |
| Backend Developer (Rust) | 必要 | Shapes organizational security strategy for Rust: memory safety advantages at architectural level, supply chain security (cargo-vet, crev), compliance frameworks. Defines security incident response processes, bug bounty programs and unsafe code audit standards. |
| Backend Developer (Scala) | 必要 | Shapes application security strategy for Scala platform: OWASP SAMM maturity, Security Champions program, SDLC security integration. Defines vulnerability disclosure policies, compliance requirements (PCI DSS, GDPR) and security tooling budget for the entire organization. |
| BI Analyst | Shapes corporate data security policy for analytical platforms at the company level. Defines data governance and compliance standards for enterprise BI systems. Publishes research on data security in analytical platforms and data mesh. | |
| Blockchain Developer | 必要 | Defines enterprise security strategy. Shapes security architecture. Coordinates compliance. Represents organization in the security community. |
| Compiler Engineer | Shapes security strategy for the compiler ecosystem at the organizational level. Defines hardening standards, responsible disclosure processes and bug bounty program integration. | |
| Computer Vision Engineer | Shapes CV platform security strategy for the organization considering OWASP and ML-specific threats. Defines adversarial robustness and model security standards. | |
| Data Analyst | Shapes application security strategy for the organization's analytical platform following OWASP standards. Coordinates the security program with the InfoSec team and implements a shift-left approach. | |
| Data Engineer | Shapes data security strategy: comprehensive data protection framework, compliance automation, privacy-by-design architecture. | |
| Data Scientist | Shapes ML security strategy: responsible AI framework, model security governance. | |
| Database Engineer / DBA | Shapes organizational data protection strategy: zero-trust database access architecture, data security awareness program, SOC integration for monitoring database security threats. | |
| Desktop Developer (.NET WPF/WinUI/MAUI) | 必要 | Shapes enterprise security standards for .NET desktop. Evaluates compliance (SOC2, HIPAA). Defines secure SDLC for the organization. |
| Desktop Developer (Electron/Tauri) | 必要 | Shapes enterprise security standards for Electron. Evaluates compliance. Defines secure SDLC. |
| Desktop Developer (Qt/C++) | 必要 | Shapes enterprise security standards for desktop. Evaluates compliance requirements (SOC2, GDPR). Defines security maturity model for the organization. |
| DevOps Engineer | 必要 | Develops corporate DevOps security architecture: zero-trust model for infrastructure, automated compliance (SOC2, PCI DSS, HIPAA), risk management platform. Defines security roadmap and mentors teams in secure development culture. |
| DevSecOps Engineer | 必要 | Architecturally defines organizational application security approach through OWASP SAMM Level 3. Influences OWASP tool roadmap. Develops AppSec maturity assessment framework integrating ASVS, SAMM and OWASP Top 10 into unified risk management system. |
| Embedded Developer | Shapes product security strategy: defines security development lifecycle for firmware, establishes threat modeling methodology, drives security certification and compliance programs. | |
| Engineering Manager | 必要 | Defines enterprise security strategy for engineering development practices spanning all product and platform teams. Shapes security architecture governance ensuring OWASP compliance across technology portfolios. Coordinates organizational compliance programs and drives security culture transformation at engineering leadership level. |
| Flutter Developer | Defines organizational mobile security policy based on the OWASP framework. Creates automated systems for verifying Flutter app compliance with security standards. | |
| Frontend Developer (Angular) | Defines organizational frontend security strategy based on the OWASP framework. Creates automated systems for verifying Angular application compliance with standards. | |
| Frontend Developer (Svelte) | Shapes frontend platform security strategy for the organization following OWASP standards. Defines vulnerability management and compliance processes for client applications. | |
| Fullstack Developer | 必要 | Shapes organizational security strategy for fullstack development: security champions program, automated security gates, compliance (SOC2, GDPR). Defines security architectural patterns and creates a platform for secure-by-default development. |
| Game Designer | Shapes corporate security policy for the studio's game product lineup. Defines architectural standards for protection against game threats at the industry level. Publishes research and recommendations on online game security and player data protection. | |
| Game QA Engineer | Shapes game security strategy: comprehensive security testing, anti-cheat architecture validation, security governance. | |
| Game Server Developer | Shapes the security program for game infrastructure at the studio level. Implements DevSecOps practices, coordinates bug bounty program, and defines player data protection policies. | |
| Infrastructure Engineer | 必要 | Shapes application security strategy at infrastructure level for the entire organization: defense-in-depth architecture, WAF-as-code standards through Terraform, bug bounty program integration. Defines RASP and runtime protection implementation roadmap, coordinates with AppSec team on unified OWASP protection approach. |
| IoT Engineer | 必要 | Defines enterprise IoT security strategy based on OWASP and IEC 62443. Builds security maturity model for IoT organization. |
| Language Tooling Engineer | Shapes industry security standards for language tools based on OWASP. Influences vulnerability detection methodology development through static code analysis. | |
| LLM Engineer | Shapes LLM security strategy: responsible AI framework, safety architecture, governance. | |
| ML Engineer | Shapes organizational ML platform security strategy considering emerging threats: model extraction, backdoor attacks. Defines security roadmap for GenAI and LLM deployments with prompt injection protection. | |
| MLOps Engineer | Shapes the AI/ML security strategy at the organizational level: ML-specific threat models, compliance for regulated industries, responsible AI and bias detection standards. | |
| Network Engineer | Shapes OWASP security strategy for network engineering at the organizational level. Defines best practices and influences technology choices beyond their own team. Is a recognized expert in this area. | |
| NLP Engineer | Shapes industry security standards for NLP and AI systems. Influences OWASP recommendation development for ML applications and defines best practices for language model protection. | |
| Penetration Testing Engineer | 必要 | Defines enterprise offensive security strategy spanning application, infrastructure, and supply chain attack surfaces. Shapes organizational red team capabilities and advanced persistent threat simulation programs. Coordinates industry compliance and represents the organization at security conferences and in vulnerability research communities. |
| Performance Testing Engineer | Shapes secure performance testing strategy for the organization: standards for testing in regulated environments, security implications of scaling, zero-trust test environments. | |
| Platform Engineer | Shapes platform security strategy: comprehensive security framework, compliance automation, threat modeling for platform services. Defines security governance. | |
| Product Manager | Shapes corporate product security strategy at the company level. Defines industry standards for security-driven product development. Publishes research on the impact of security investments on user trust and business metrics. | |
| QA Automation Engineer | Shapes security testing program for the organization. Creates an automated OWASP verification framework, integrates into the release process, and defines security coverage metrics. | |
| QA Engineer (Manual) | 必要 | Defines enterprise security testing strategy bridging manual QA expertise with application security requirements. Shapes security-aware quality engineering culture ensuring OWASP coverage in testing processes at organizational scale. Coordinates compliance verification frameworks and represents quality perspective in security governance decisions. |
| QA Security Engineer | 必要 | Designs security testing methodology based on OWASP: organizational ASVS target levels, custom testing guides, industry-specific security requirements. Defines security assurance framework. |
| React Native Developer | Shapes industry-level mobile application security standards for React Native. Influences the evolution of cross-platform application protection practices and security audit methodologies. | |
| Release Engineer | Develops organizational release security policy based on the OWASP framework. Creates platform solutions for automated compliance control at every delivery stage. | |
| Security Analyst | 必要 | Defines enterprise security monitoring and analysis strategy spanning application, network, and cloud environments. Shapes security operations architecture integrating OWASP threat intelligence with organizational detection capabilities. Coordinates industry compliance programs and represents the organization in threat intelligence sharing communities. |
| Site Reliability Engineer (SRE) | 必要 | Designs platform security strategy: zero-trust architecture, supply chain security, platform security controls. Defines security governance for cloud infrastructure. |
| Smart Contract Developer | 必要 | Defines enterprise smart contract security strategy spanning protocol design, audit standards, and on-chain incident response capabilities. Shapes security architecture for DeFi ecosystems integrating formal verification, economic modeling, and continuous monitoring. Coordinates blockchain security compliance and represents the organization in Web3 security communities and standards bodies. |
| Solutions Architect | Shapes security architecture strategy: organizational security framework, compliance automation, zero-trust architecture. | |
| Systems Programmer (C/C++) | Shapes system security strategy: comprehensive memory safety, kernel security governance. | |
| Technical Lead | 必要 | Defines enterprise security strategy for software development spanning all technology stacks and product domains. Shapes security architecture governance aligning OWASP best practices with organizational development workflows. Coordinates compliance programs and represents engineering perspective in enterprise security governance and community engagement. |
| Technical Product Manager | Shapes security program for the organization's product portfolio. Ensures GDPR/SOC2 compliance, creates framework for security risk assessment of new product initiatives. | |
| Technical Writer | Shapes industry standards for documenting application security and compliance. Publishes research on security documentation effectiveness for reducing vulnerabilities. Influences the development of automatic security documentation generation from scan results. | |
| Telecom Developer | Shapes telecom platform security strategy, combining OWASP with industry standards NESAS and SCAS. Defines security roadmap for 5G and Open RAN considering new attack surfaces. | |
| Unity Developer | Shapes game security strategy: comprehensive anti-cheat, server authority, security governance. | |
| Unreal Engine Developer | Shapes security strategy: platform security architecture, compliance, governance. | |
| XR Unity Developer | Shapes information security strategy for XR products at organizational level. Defines standards for protecting sensitive VR/AR user data considering regulatory requirements. |