Browse Skills

1078+ expert skills across 5 domains. Scored on 6 quality dimensions.

Supabase RLS Security Expert

Gold
84.9Security

Design and implement production-grade Row-Level Security policies for Supabase applications, ensuring data isolation, multi-tenant security, and optimal query performance.

supabaserow-level-securityrls

API Security Hardening Specialist

Gold
84.9Security

Comprehensive API security assessment and hardening specialist that analyzes REST, GraphQL, and gRPC APIs against the OWASP API Security Top 10, identifies vulnerabilities, and produces prioritized hardening plans with implementation roadmaps.

api-securityowasp-top-10security-hardening

API Security Hardener

Gold
84.8Security

Hardens API endpoints with rate limiting, input validation, CORS, CSP, authentication, bot protection, and gateway security following OWASP API Security Top 10.

api-securityrate-limitinginput-validation

Authentication & Authorization Architect

Gold
84.8Security

Designs secure authentication and authorization systems using OAuth2, OIDC, JWT, RBAC/ABAC, MFA, and Passkeys with defense-in-depth strategies.

authenticationauthorizationoauth2

SIEM Architecture Specialist

Gold
84.6Security

Designs and optimizes Security Information and Event Management (SIEM) architectures, including log collection strategies, correlation rules, alert tuning, and SOC workflow integration for enterprise threat detection.

siemsecurity-monitoringlog-management

WebAuthn Passkey Engineer

Gold
84.6Security

Expert guidance for implementing passwordless authentication with WebAuthn passkeys — covering registration/authentication ceremonies, platform vs roaming authenticators, cross-device flows, conditional UI, and migration from passwords to phishing-resistant credentials.

webauthnpasskeysfido2

DNS Architecture Specialist

Gold
84.6Security

Designs, secures, and operates DNS infrastructure including authoritative servers, cloud-managed DNS, DNSSEC, traffic management, Kubernetes service discovery, and zero-downtime migrations.

dnsdnssecroute53

Mobile Security Expert

Gold
84.6Security

Provides expert guidance on securing mobile applications for iOS and Android, covering OWASP Mobile Top 10, certificate pinning, secure local storage, biometric authentication, reverse engineering protection, and secure communication patterns.

mobile-securityowasp-mobilecertificate-pinning

Cloud IAM Security Architect

Gold
84.6Security

Expert architect for designing and implementing cloud Identity and Access Management security — from IAM policy design, least-privilege enforcement, and role-based access control to cross-account trust relationships, service account hardening, conditional access policies, and multi-cloud IAM federation strategies.

cloud-iamidentity-access-managementleast-privilege

Supply Chain Security Architect

Gold
84.6Security

Designs comprehensive software supply chain security strategies including SBOM generation, SLSA framework compliance, build provenance, dependency integrity verification, and protection against supply chain attacks using Sigstore and in-toto.

supply-chain-securitysbomslsa

Browser Extension Security Auditor

Gold
84.6Security

Audits browser extensions for permissions abuse, content script vulnerabilities, CSP violations, and malicious code patterns across Chrome/Firefox extension ecosystems.

browser-extensionchrome-extensionfirefox-addon

SAST & DAST Pipeline Engineer

Gold
84.4Security

Design and integrate Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) tools into CI/CD pipelines with automated security gates, false positive triage workflows, and SARIF-based result aggregation.

sastdastsemgrep

Privacy by Design Engineer

Gold
84.4Security

Guides implementation of Privacy by Design following Ann Cavoukian's 7 foundational principles, covering data minimization, pseudonymization/anonymization techniques, consent architecture, DPIA methodology, privacy-preserving computation (differential privacy, homomorphic encryption), data retention policies, and GDPR Article 25 technical measures for building privacy-respecting systems from the ground up.

privacy-by-designgdprdata-minimization

Content Security Policy Architect

Gold
84.3Security

Expert guidance for designing, deploying, and maintaining Content Security Policy (CSP) headers that effectively prevent XSS, data injection, and content integrity attacks across modern web applications.

cspcontent-security-policyxss-prevention

Webhook Security Architect

Gold
84.3Security

Design and implement secure webhook receiving endpoints with HMAC signature verification, replay attack prevention, idempotent processing, and secret rotation strategies.

webhook-securityhmac-verificationreplay-prevention

Cryptography Implementation Advisor

Gold
84.2Security

Advises on cryptographic implementation including encryption at rest/in transit, key management (KMS/HSM), TLS configuration, hashing algorithms, digital signatures, and post-quantum readiness. Focuses on correct usage of proven primitives rather than custom cryptography.

cryptographyencryptionkey-management

Digital Forensics Guide

Gold
84.2Security

Provides expert guidance on digital forensics methodology including evidence preservation, chain of custody, log analysis, memory forensics, disk forensics, and forensic reporting — strictly defensive and investigative in nature.

digital-forensicsdfirincident-response

Secure SDLC Advisor

Gold
84.2Security

Guides organizations in embedding security throughout every phase of the Software Development Lifecycle, from requirements gathering through deployment, using industry frameworks like BSIMM, OWASP SAMM, and threat modeling methodologies.

secure-sdlcssdlcthreat-modeling

Privileged Access Controls Specialist

Gold
84.0Security

Design and implement privileged access management (PAM) systems including credential vaulting, just-in-time access, session management, and compliance-ready access governance for enterprise and cloud environments.

pamprivileged-accessiam

SOC Operations Designer

Gold
84.0Security

Designs Security Operations Center architectures including SIEM deployment, alert triage workflows, detection engineering rules, threat hunting programs, SOAR playbooks, and analyst tier structures optimized for detection efficacy and analyst efficiency.

socsecurity-operationssiem

Compliance as Code Architect

Gold
84.0Security

Expert compliance-as-code advisor that helps organizations automate regulatory compliance using policy-as-code frameworks like OPA/Rego and HashiCorp Sentinel, implementing automated CIS benchmark scanning, SOC 2 evidence collection, and continuous compliance monitoring.

compliance-as-codepolicy-as-codeopa

Bot & Fraud Mitigation Specialist

Gold
84.0Security

Design and implement comprehensive bot detection, credential stuffing defense, and fraud prevention systems that balance security with user experience across web applications and APIs.

bot-detectionfraud-preventioncredential-stuffing

Security Metrics Dashboard Designer

Gold
84.0Security

Designs comprehensive security metrics programs with KPIs, KRIs, dashboards, and reporting frameworks that translate security posture into actionable insights for technical teams, management, and board-level stakeholders.

security-metricskpikri

Consent Logging Architect

Gold
83.8Security

Designs tamper-evident consent logging architectures that provide audit-complete proof of user consent across GDPR, CCPA/CPRA, and ePrivacy regulations, with immutable event sourcing and real-time consent signal propagation.

consent-managementgdprccpa
Page 1 of 2Next