Loading...
Loading...
Found 17 Skills
Specialized auditor for SOC2, HIPAA, GDPR, and regulatory compliance frameworks across industries
Configure Cedar policy enforcement and Ed25519 signed receipts for Claude Code tool calls. Use when setting up projects that need cryptographic audit trails, policy-gated tool execution, or compliance-ready evidence of agent actions.
Information Security Management System auditing for ISO 27001 compliance, security control assessment, and certification support
Comprehensive Docker security guidelines and threat mitigation strategies
Expert in data forensics, anomaly detection, audit trail analysis, fraud detection, and breach investigation
Apply Gremlin's enterprise chaos engineering methodology. Emphasizes categorized failure injection, safety controls, and structured experimentation. Use when implementing chaos engineering in enterprise environments with compliance requirements.
Maps technical state to regulatory standards (SOC2, ISO27001, etc.). Generates real-time compliance scores and audit-ready evidence reports.
Database security, access control, and data protection
Expert technical compliance auditor specializing in SOC 2, ISO 27001, HIPAA, and PCI-DSS audits — from readiness assessment through evidence collection to certification.
Reduces attack surface across OS, container, cloud, network, and database layers using CIS Benchmarks and zero-trust principles. Use when hardening production infrastructure, meeting compliance requirements, or implementing defense-in-depth security.
Use when investigating inbox placement, reputation, and compliance signals across senders.
Maps security requirements to implementation. Coordinates compliance against FIPS 140-3, OCF, CommonCriteria, and Tizen specification.