Loading...
Loading...
Found 5212 skills
jeremylongshore
Automates cryptographic key rotation processes to enhance security and compliance in key management systems.
jeremylongshore
Enables comprehensive vulnerability scanning for security issues, including CVE detection in code, dependencies, and configurations.
jeremylongshore
Validates SSL/TLS certificate expiration and integrity for HTTPS websites to ensure secure communications.
jeremylongshore
Analyzes and audits an organization's attack surface to identify security vulnerabilities and potential entry points.
jeremylongshore
Automates web application penetration testing, identifying OWASP Top 10 vulnerabilities and providing detailed security flaw reports.
jeremylongshore
Configures user roles, permissions, and access control policies for Granola enterprise systems using RBAC.
jeremylongshore
Validates payment systems against PCI-DSS security standards to ensure compliance with payment card data security requirements.
jeremylongshore
Configures enterprise SSO, role-based access control, and organization management for Fireflies.ai.
jeremylongshore
Automates web application penetration testing, identifying OWASP Top 10 vulnerabilities and providing detailed security flaw reports.
jeremylongshore
Monitors and logs API requests with correlation IDs, performance metrics, and security audit trails for comprehensive request auditing and compliance.
jeremylongshore
Audits healthcare applications for HIPAA compliance, verifying protection of protected health information (PHI) against security vulnerabilities.
jeremylongshore
Validates webhook signatures to ensure authenticity and prevent tampering in API integrations.
jeremylongshore
Guides users through security incident response lifecycle, including classification, evidence collection, and remediation steps for incidents like breaches and ransomware.
jeremylongshore
Automatically scans code for cross-site scripting (XSS) vulnerabilities upon user request, identifying security risks.
jeremylongshore
Validates encryption implementations and cryptographic practices to ensure secure data handling and compliance with security standards.
jeremylongshore
Generates comprehensive security audit reports to assess security posture, identify vulnerabilities, and evaluate compliance with standards like PCI-DSS.
jeremylongshore
Generates comprehensive security audit reports analyzing system vulnerabilities, compliance status, and providing remediation steps for security posture improvement.
jeremylongshore
Automates generation of security vulnerability reports, documenting identified weaknesses and risks for compliance purposes.
jeremylongshore
Analyzes password strength to assess security vulnerabilities and ensure compliance with security standards.
jeremylongshore
Automates web application penetration testing, identifies OWASP Top 10 vulnerabilities, and provides detailed security flaw reports.
jeremylongshore
Configures Exa enterprise SSO, role-based access control (RBAC), and organization management for secure access and compliance.
jeremylongshore
Scans codebases for exposed secrets using pattern matching and entropy analysis to identify security vulnerabilities.
jeremylongshore
Validates CORS configurations to identify security vulnerabilities, ensuring proper implementation and preventing unauthorized cross-origin requests.
jeremylongshore
Ensures GDPR and CCPA compliance for Ideogram integrations through PII handling, data retention, and privacy pattern implementation.