Loading...
Loading...
Found 3 Skills
Analyzes events through cybersecurity lens using threat modeling, attack surface analysis, defense-in-depth, zero-trust architecture, and risk-based frameworks (CIA triad, STRIDE, MITRE ATT&CK). Provides insights on vulnerabilities, attack vectors, defense strategies, incident response, and security posture. Use when: Security incidents, vulnerability assessments, threat analysis, security architecture, compliance. Evaluates: Confidentiality, integrity, availability, threat actors, attack patterns, controls, residual risk.
Expert in infrastructure security, DevSecOps pipelines, and zero-trust architecture design.
Modern security standards including Zero Trust Architecture, supply chain security, DevSecOps integration, and cloud-native protection