4. Security & Compliance
Found 3608 skills
stride-analysis-patterns
wshobson
Applies STRIDE methodology for systematic threat identification in security analysis and threat modeling sessions.
security-requirement-extraction
wshobson
Derives security requirements from threat models and business context to create actionable security user stories and test cases.
wcag-audit-patterns
wshobson
Conducts automated and manual WCAG 2.2 accessibility audits with remediation guidance for website compliance.
k8s-security-policies
wshobson
Enforces production-grade Kubernetes security via NetworkPolicy, PodSecurityPolicy, and RBAC for network isolation and pod security standards.
memory-forensics
wshobson
Analyzes memory dumps for incident response and malware analysis using Volatility tools.
pci-compliance
wshobson
Enables secure handling of payment card data by implementing PCI DSS compliance requirements for payment systems.
threat-mitigation-mapping
wshobson
Maps security threats to appropriate controls for prioritizing investments, creating remediation plans, and validating control effectiveness.
auth-implementation-patterns
wshobson
Implements secure authentication and authorization patterns including JWT, OAuth2, and RBAC for scalable access control systems and API security.
mtls-configuration
wshobson
Configures mutual TLS (mTLS) for secure, zero-trust service-to-service communication with certificate-based authentication.
gdpr-data-handling
wshobson
Provides GDPR compliance tools for consent management, data subject rights, and privacy by design in data processing systems.
solidity-security
wshobson
Enables secure smart contract development by implementing best practices to prevent common vulnerabilities in Solidity.
anti-reversing-techniques
wshobson
Analyzes and bypasses anti-reversing techniques in protected binaries for authorized security analysis and debugging.
binary-analysis-patterns
wshobson
Analyzes executable binaries via disassembly, decompilation, and control flow to identify security patterns and vulnerabilities.
attack-tree-construction
wshobson
Constructs visual attack trees to map threat scenarios, identify security gaps, and communicate risks to stakeholders.
sast-configuration
wshobson
Configures Static Application Security Testing (SAST) tools to automate vulnerability detection in application code, supporting DevSecOps implementation.
protocol-reverse-engineering
wshobson
Analyzes network traffic to reverse engineer proprietary protocols, enabling understanding and debugging of communication systems.
screen-reader-testing
wshobson
Validates web application accessibility by testing with screen readers (VoiceOver, NVDA, JAWS) to ensure compliance with accessibility standards.
azure-role-selector
github
Guides users in selecting Azure roles with least privilege access based on desired permissions and provides implementation guidance.
security-compliance
davila7
Guides security professionals in implementing defense-in-depth architectures and achieving compliance with frameworks like SOC2, ISO27001, GDPR, and HIPAA.
risk-management-specialist
davila7
Delivers ISO 14971-compliant risk management services for medical devices, including analysis, evaluation, control, and post-production analysis.
senior-security
davila7
Comprehensive security engineering including penetration testing, security architecture, and compliance auditing.
isms-audit-expert
davila7
Provides ISO 27001 audit expertise, security control assessment, and compliance verification for internal and external ISMS audits.
quality-manager-qms-iso13485
davila7
ISO 13485 QMS specialist for medical device companies, providing implementation, compliance, and certification support.
quality-manager-qmr
davila7
Provides strategic regulatory compliance oversight and quality system governance for HealthTech and MedTech organizations, ensuring management accountability and strategic quality leadership.