Browse Skills
1078+ expert skills across 5 domains. Scored on 6 quality dimensions.
Ransomware Response Coordinator
PlatinumGuides organizations through ransomware incidents with structured containment, recovery sequencing, legal compliance, and post-incident analysis.
DevSecOps Pipeline Architect
PlatinumIntegrate security tooling and practices into CI/CD pipelines for automated, shift-left security at every stage of delivery.
Container Runtime Security Expert
PlatinumImplement runtime security for containerized workloads including threat detection, policy enforcement, and incident response in Kubernetes.
Security Architecture Reviewer
PlatinumConduct systematic security architecture reviews to identify design flaws, missing controls, and compliance gaps before deployment.
Mobile App Security Auditor
PlatinumConducts comprehensive security audits of iOS and Android applications, covering OWASP Mobile Top 10, data storage, network communication, authentication, and binary protections with actionable remediation guidance.
Disaster Recovery Planner
PlatinumExpert guidance for designing, implementing, and testing disaster recovery strategies, covering business impact analysis, RPO/RTO engineering, cloud DR patterns, data protection, failover automation, and compliance-aligned testing programs.
API Rate Limiting Architect
PlatinumDesign production-grade API rate limiting systems with the right algorithm selection, distributed Redis implementation, tier-based quota management, and layered abuse prevention strategies.
Kubernetes Security Hardening
PlatinumProduction-grade Kubernetes security configuration including RBAC policies, network policies, pod security standards, secrets management, and supply chain security with admission controllers.
Supabase RLS Security Expert
GoldDesign and implement production-grade Row-Level Security policies for Supabase applications, ensuring data isolation, multi-tenant security, and optimal query performance.
API Security Hardening Specialist
GoldComprehensive API security assessment and hardening specialist that analyzes REST, GraphQL, and gRPC APIs against the OWASP API Security Top 10, identifies vulnerabilities, and produces prioritized hardening plans with implementation roadmaps.
Authentication & Authorization Architect
GoldDesigns secure authentication and authorization systems using OAuth2, OIDC, JWT, RBAC/ABAC, MFA, and Passkeys with defense-in-depth strategies.
API Security Hardener
GoldHardens API endpoints with rate limiting, input validation, CORS, CSP, authentication, bot protection, and gateway security following OWASP API Security Top 10.
WebAuthn Passkey Engineer
GoldExpert guidance for implementing passwordless authentication with WebAuthn passkeys — covering registration/authentication ceremonies, platform vs roaming authenticators, cross-device flows, conditional UI, and migration from passwords to phishing-resistant credentials.
Cloud IAM Security Architect
GoldExpert architect for designing and implementing cloud Identity and Access Management security — from IAM policy design, least-privilege enforcement, and role-based access control to cross-account trust relationships, service account hardening, conditional access policies, and multi-cloud IAM federation strategies.
Browser Extension Security Auditor
GoldAudits browser extensions for permissions abuse, content script vulnerabilities, CSP violations, and malicious code patterns across Chrome/Firefox extension ecosystems.
DNS Architecture Specialist
GoldDesigns, secures, and operates DNS infrastructure including authoritative servers, cloud-managed DNS, DNSSEC, traffic management, Kubernetes service discovery, and zero-downtime migrations.
Supply Chain Security Architect
GoldDesigns comprehensive software supply chain security strategies including SBOM generation, SLSA framework compliance, build provenance, dependency integrity verification, and protection against supply chain attacks using Sigstore and in-toto.
SIEM Architecture Specialist
GoldDesigns and optimizes Security Information and Event Management (SIEM) architectures, including log collection strategies, correlation rules, alert tuning, and SOC workflow integration for enterprise threat detection.
Mobile Security Expert
GoldProvides expert guidance on securing mobile applications for iOS and Android, covering OWASP Mobile Top 10, certificate pinning, secure local storage, biometric authentication, reverse engineering protection, and secure communication patterns.
SAST & DAST Pipeline Engineer
GoldDesign and integrate Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) tools into CI/CD pipelines with automated security gates, false positive triage workflows, and SARIF-based result aggregation.
Privacy by Design Engineer
GoldGuides implementation of Privacy by Design following Ann Cavoukian's 7 foundational principles, covering data minimization, pseudonymization/anonymization techniques, consent architecture, DPIA methodology, privacy-preserving computation (differential privacy, homomorphic encryption), data retention policies, and GDPR Article 25 technical measures for building privacy-respecting systems from the ground up.
Content Security Policy Architect
GoldExpert guidance for designing, deploying, and maintaining Content Security Policy (CSP) headers that effectively prevent XSS, data injection, and content integrity attacks across modern web applications.
Webhook Security Architect
GoldDesign and implement secure webhook receiving endpoints with HMAC signature verification, replay attack prevention, idempotent processing, and secret rotation strategies.
Secure SDLC Advisor
GoldGuides organizations in embedding security throughout every phase of the Software Development Lifecycle, from requirements gathering through deployment, using industry frameworks like BSIMM, OWASP SAMM, and threat modeling methodologies.