Test system behavior under extreme load conditions to identify breaking points, capacity limits, and failure modes....
cat ~/الجديد
تصفح أحدث المهارات المضافة إلى السوق
Implement stored procedures and functions for database logic. Use when creating reusable database routines, complex...
Conduct statistical tests including t-tests, chi-square, ANOVA, and p-value analysis for statistical significance,...
Implement static code analysis with linters, formatters, and security scanners to catch bugs early. Use when...
Manage stakeholder expectations and engagement through targeted communication, regular updates, and relationship...
Manage SSL/TLS certificates with automated provisioning, renewal, and monitoring using Let's Encrypt, ACM, or Vault.
Analyze and optimize SQL queries for performance. Use when improving slow queries, reducing execution time, or...
Prevent SQL injection attacks using prepared statements, parameterized queries, and input validation. Use when...
Build enterprise Spring Boot applications with annotations, dependency injection, data persistence, REST...
Implement secure session management systems with JWT tokens, session storage, token refresh, logout handling, and...
Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and...
Design and implement serverless applications using AWS Lambda, Azure Functions, and GCP Cloud Functions with...
Implement server-side rendering with template engines, view layers, and dynamic content generation. Use when...
Classify text sentiment using NLP techniques, lexicon-based analysis, and machine learning for opinion mining, brand...
Implement semantic versioning (SemVer) with automated release management. Use conventional commits,...
Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security...
Configure HTTP security headers including CSP, HSTS, X-Frame-Options, and XSS protection. Use when hardening web...
Create security policies, guidelines, compliance documentation, and security best practices. Use when documenting...
Conduct comprehensive security compliance audits for SOC 2, GDPR, HIPAA, PCI-DSS, and ISO 27001. Use when preparing...
Implement comprehensive security audit logging for compliance, forensics, and SIEM integration. Use when building...
Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing...
Implement secrets management with HashiCorp Vault, AWS Secrets Manager, or Kubernetes Secrets for secure credential...
Create operational runbooks, playbooks, standard operating procedures (SOPs), and incident response guides. Use when...
Develop Ruby on Rails applications with models, controllers, views, Active Record ORM, authentication, and RESTful...