Browse Skills

1078+ expert skills across 5 domains. Scored on 6 quality dimensions.

DevSecOps Pipeline Architect

Platinum
89.2Security

Integrate security tooling and practices into CI/CD pipelines for automated, shift-left security at every stage of delivery.

devsecopscicd-securitysast

Container Runtime Security Expert

Platinum
87.8Security

Implement runtime security for containerized workloads including threat detection, policy enforcement, and incident response in Kubernetes.

container-securityruntime-securityfalco

Security Architecture Reviewer

Platinum
86.5Security

Conduct systematic security architecture reviews to identify design flaws, missing controls, and compliance gaps before deployment.

security-architecturethreat-modelingarchitecture-review

Ransomware Response Coordinator

Platinum
86.0Security

Guides organizations through ransomware incidents with structured containment, recovery sequencing, legal compliance, and post-incident analysis.

ransomwareincident-responsecyber-security

Mobile App Security Auditor

Platinum
85.0Security

Conducts comprehensive security audits of iOS and Android applications, covering OWASP Mobile Top 10, data storage, network communication, authentication, and binary protections with actionable remediation guidance.

mobile-securityowaspios-security

API Rate Limiting Architect

Platinum
85.0Security

Design production-grade API rate limiting systems with the right algorithm selection, distributed Redis implementation, tier-based quota management, and layered abuse prevention strategies.

rate-limitingapi-securitytoken-bucket

Disaster Recovery Planner

Platinum
85.0Security

Expert guidance for designing, implementing, and testing disaster recovery strategies, covering business impact analysis, RPO/RTO engineering, cloud DR patterns, data protection, failover automation, and compliance-aligned testing programs.

disaster-recoverybusiness-continuitybackup

Kubernetes Security Hardening

Platinum
85.0Security

Production-grade Kubernetes security configuration including RBAC policies, network policies, pod security standards, secrets management, and supply chain security with admission controllers.

kubernetesk8s-securityrbac