Book flights, manage Rapid Rewards, check-in, and access Southwest Airlines services
Manage container registries (Docker Hub, ECR, GCR) with image scanning, retention policies, and access control.
Handoff designs to developers with Zeplin - access design specs, export assets, and manage style guides
Complete guide for CloudBase cloud functions development - runtime selection, deployment, logging, invocation, and HTTP access configuration.
Book flights, manage SkyMiles, check flight status, and access Delta Air Lines services
Book flights, manage AAdvantage miles, check flight status, and access American Airlines services
Build accessible, responsive, and performant frontend components with design system best practices, modern CSS, and framework-agnostic patterns.
Integrate secrets management (Vault, AWS, Azure, GCP) with rotation policies, access controls, and Kubernetes/CI/CD application integration.
Rent cars, manage reservations, and access Enterprise Plus benefits through Enterprise Rent-A-Car
Review identity and access management using NIST SP 800-63B guidelines with MFA enforcement, password policy, and least privilege validation.
SSH remote access patterns and utilities. Connect to servers, manage keys, tunnels, and transfers.
SSH remote access patterns and utilities. Connect to servers, manage keys, tunnels, and transfers.
Book flights, manage TrueBlue points, check Mosaic status, and access JetBlue services
Guidelines for semantic HTML markup, document structure, forms, accessibility attributes, and modern HTML best practices
Access DataCamp data science and analytics courses
Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations
Deep security review patterns for authorization logic, data access boundaries, action isolation, rate limiting, and protecting sensitive operations
Manage S3 buckets with versioning, encryption, access control, lifecycle policies, and replication. Use for object storage, static sites, and data lakes.
Run accessibility and visual design review on components. Use when reviewing UI code for WCAG compliance and design issues.
Validate application security using OWASP Top 10 2021 and API Security Top 10 guidelines with injection prevention and access control checks.