{ "namespace": "analyst-assessment", "expanded": "Analyst (Self) Assessment", "description": "A series of assessment predicates describing the analyst capabilities to perform analysis. These assessment can be assigned by the analyst him/herself or by another party evaluating the analyst.", "version": 1, "predicates": [ { "value": "experience", "expanded": "Experience", "description": "The analyst experience expressed in years range in the field tagged. The year range is based on a standard 40-hour work week." }, { "value": "binary-reversing-arch", "expanded": "Reversing arch", "description": "Architecture that the analyst has experience with." }, { "value": "binary-reversing-experience", "expanded": "Reversing experience", "description": "The analyst experience in reversing expressed in years range in the field tagged. The year range is based on a standard 40-hour work week." }, { "value": "os", "expanded": "Operating System", "description": "Operating System that the analyst has experience with." }, { "value": "web", "expanded": "Web applications-related skills", "description": "Web application vulnerabilities and technique that the analyst has experience with." }, { "value": "crypto-experience", "expanded": "Experience", "description": "The analyst experience related to cryptography expressed in years range in the field tagged." } ], "values": [ { "predicate": "experience", "entry": [ { "numerical_value": 1, "value": "less-than-1-year", "expanded": "Less than 1 year" }, { "numerical_value": 2, "value": "between-1-and-5-years", "expanded": "Between 1 and 5 years" }, { "numerical_value": 3, "value": "between-5-and-10-years", "expanded": "Between 5 and 10 years" }, { "numerical_value": 4, "value": "between-10-and-20-years", "expanded": "Between 10 and 20 years" }, { "numerical_value": 5, "value": "more-than-20-years", "expanded": "More than 20 years" } ] }, { "predicate": "binary-reversing-arch", "entry": [ { "value": "x86", "expanded": "x86-32 & x86-64" }, { "value": "arm", "expanded": "ARM & ARM-64" }, { "value": "mips", "expanded": "mips & mips-64" }, { "value": "powerpc", "expanded": "PowerPC" } ] }, { "predicate": "binary-reversing-experience", "entry": [ { "numerical_value": 1, "value": "less-than-1-year", "expanded": "Less than 1 year" }, { "numerical_value": 2, "value": "between-1-and-5-years", "expanded": "Between 1 and 5 years" }, { "numerical_value": 3, "value": "between-5-and-10-years", "expanded": "Between 5 and 10 years" }, { "numerical_value": 4, "value": "between-10-and-20-years", "expanded": "Between 10 and 20 years" }, { "numerical_value": 5, "value": "more-than-20-years", "expanded": "More than 20 years" } ] }, { "predicate": "os", "entry": [ { "value": "windows", "expanded": "Current Microsoft Windows system" }, { "value": "linux", "expanded": "GNU/linux derivative OS" }, { "value": "ios", "expanded": "Current IOS" }, { "value": "macos", "expanded": "Current Apple OS" }, { "value": "android", "expanded": "Current Android OS" }, { "value": "bsd", "expanded": "BSD" } ] }, { "predicate": "web", "entry": [ { "value": "ipex", "expanded": "Inter-protocol exploitations" }, { "value": "common", "expanded": "Common vulnerabilities as SQL injections, CSRF, XSS, CSP bypasses, etc." }, { "value": "js-desobfuscation", "expanded": "De-obfuscation of Javascript payloads" } ] }, { "predicate": "crypto-experience", "entry": [ { "numerical_value": 1, "value": "less-than-1-year", "expanded": "Less than 1 year" }, { "numerical_value": 2, "value": "between-1-and-5-years", "expanded": "Between 1 and 5 years" }, { "numerical_value": 3, "value": "between-5-and-10-years", "expanded": "Between 5 and 10 years" }, { "numerical_value": 4, "value": "between-10-and-20-years", "expanded": "Between 10 and 20 years" }, { "numerical_value": 5, "value": "more-than-20-years", "expanded": "More than 20 years" } ] } ] }