Browse Skills

1078+ expert skills across 5 domains. Scored on 6 quality dimensions.

Ransomware Response Coordinator

Platinum
90.0Security

Guides organizations through ransomware incidents with structured containment, recovery sequencing, legal compliance, and post-incident analysis.

ransomwareincident-responsecyber-security

DevSecOps Pipeline Architect

Platinum
89.2Security

Integrate security tooling and practices into CI/CD pipelines for automated, shift-left security at every stage of delivery.

devsecopscicd-securitysast

Container Runtime Security Expert

Platinum
87.8Security

Implement runtime security for containerized workloads including threat detection, policy enforcement, and incident response in Kubernetes.

container-securityruntime-securityfalco

Security Architecture Reviewer

Platinum
86.5Security

Conduct systematic security architecture reviews to identify design flaws, missing controls, and compliance gaps before deployment.

security-architecturethreat-modelingarchitecture-review

Mobile App Security Auditor

Platinum
85.0Security

Conducts comprehensive security audits of iOS and Android applications, covering OWASP Mobile Top 10, data storage, network communication, authentication, and binary protections with actionable remediation guidance.

mobile-securityowaspios-security

Disaster Recovery Planner

Platinum
85.0Security

Expert guidance for designing, implementing, and testing disaster recovery strategies, covering business impact analysis, RPO/RTO engineering, cloud DR patterns, data protection, failover automation, and compliance-aligned testing programs.

disaster-recoverybusiness-continuitybackup

API Rate Limiting Architect

Platinum
85.0Security

Design production-grade API rate limiting systems with the right algorithm selection, distributed Redis implementation, tier-based quota management, and layered abuse prevention strategies.

rate-limitingapi-securitytoken-bucket

Kubernetes Security Hardening

Platinum
85.0Security

Production-grade Kubernetes security configuration including RBAC policies, network policies, pod security standards, secrets management, and supply chain security with admission controllers.

kubernetesk8s-securityrbac

Supabase RLS Security Expert

Gold
84.9Security

Design and implement production-grade Row-Level Security policies for Supabase applications, ensuring data isolation, multi-tenant security, and optimal query performance.

supabaserow-level-securityrls

API Security Hardening Specialist

Gold
84.9Security

Comprehensive API security assessment and hardening specialist that analyzes REST, GraphQL, and gRPC APIs against the OWASP API Security Top 10, identifies vulnerabilities, and produces prioritized hardening plans with implementation roadmaps.

api-securityowasp-top-10security-hardening

Authentication & Authorization Architect

Gold
84.8Security

Designs secure authentication and authorization systems using OAuth2, OIDC, JWT, RBAC/ABAC, MFA, and Passkeys with defense-in-depth strategies.

authenticationauthorizationoauth2

API Security Hardener

Gold
84.8Security

Hardens API endpoints with rate limiting, input validation, CORS, CSP, authentication, bot protection, and gateway security following OWASP API Security Top 10.

api-securityrate-limitinginput-validation

WebAuthn Passkey Engineer

Gold
84.6Security

Expert guidance for implementing passwordless authentication with WebAuthn passkeys — covering registration/authentication ceremonies, platform vs roaming authenticators, cross-device flows, conditional UI, and migration from passwords to phishing-resistant credentials.

webauthnpasskeysfido2

Cloud IAM Security Architect

Gold
84.6Security

Expert architect for designing and implementing cloud Identity and Access Management security — from IAM policy design, least-privilege enforcement, and role-based access control to cross-account trust relationships, service account hardening, conditional access policies, and multi-cloud IAM federation strategies.

cloud-iamidentity-access-managementleast-privilege

Browser Extension Security Auditor

Gold
84.6Security

Audits browser extensions for permissions abuse, content script vulnerabilities, CSP violations, and malicious code patterns across Chrome/Firefox extension ecosystems.

browser-extensionchrome-extensionfirefox-addon

DNS Architecture Specialist

Gold
84.6Security

Designs, secures, and operates DNS infrastructure including authoritative servers, cloud-managed DNS, DNSSEC, traffic management, Kubernetes service discovery, and zero-downtime migrations.

dnsdnssecroute53

Supply Chain Security Architect

Gold
84.6Security

Designs comprehensive software supply chain security strategies including SBOM generation, SLSA framework compliance, build provenance, dependency integrity verification, and protection against supply chain attacks using Sigstore and in-toto.

supply-chain-securitysbomslsa

SIEM Architecture Specialist

Gold
84.6Security

Designs and optimizes Security Information and Event Management (SIEM) architectures, including log collection strategies, correlation rules, alert tuning, and SOC workflow integration for enterprise threat detection.

siemsecurity-monitoringlog-management

Mobile Security Expert

Gold
84.6Security

Provides expert guidance on securing mobile applications for iOS and Android, covering OWASP Mobile Top 10, certificate pinning, secure local storage, biometric authentication, reverse engineering protection, and secure communication patterns.

mobile-securityowasp-mobilecertificate-pinning

SAST & DAST Pipeline Engineer

Gold
84.4Security

Design and integrate Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) tools into CI/CD pipelines with automated security gates, false positive triage workflows, and SARIF-based result aggregation.

sastdastsemgrep

Privacy by Design Engineer

Gold
84.4Security

Guides implementation of Privacy by Design following Ann Cavoukian's 7 foundational principles, covering data minimization, pseudonymization/anonymization techniques, consent architecture, DPIA methodology, privacy-preserving computation (differential privacy, homomorphic encryption), data retention policies, and GDPR Article 25 technical measures for building privacy-respecting systems from the ground up.

privacy-by-designgdprdata-minimization

Content Security Policy Architect

Gold
84.3Security

Expert guidance for designing, deploying, and maintaining Content Security Policy (CSP) headers that effectively prevent XSS, data injection, and content integrity attacks across modern web applications.

cspcontent-security-policyxss-prevention

Webhook Security Architect

Gold
84.3Security

Design and implement secure webhook receiving endpoints with HMAC signature verification, replay attack prevention, idempotent processing, and secret rotation strategies.

webhook-securityhmac-verificationreplay-prevention

Secure SDLC Advisor

Gold
84.2Security

Guides organizations in embedding security throughout every phase of the Software Development Lifecycle, from requirements gathering through deployment, using industry frameworks like BSIMM, OWASP SAMM, and threat modeling methodologies.

secure-sdlcssdlcthreat-modeling
Page 1 of 3Next