Guide AI agents in creating REST API tests using RequestsLibrary. Use when building HTTP client tests, JSON/XML API testing, session management, authentication, file uploads, and response validation.
Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when handling sensitive credentials, rotating secrets, or securing CI/CD...
Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when handling sensitive credentials, rotating secrets, or securing CI/CD...
Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when handling sensitive credentials, rotating secrets, or securing CI/CD...
Develop React Native, Flutter, or native mobile apps with modern
Develop React Native, Flutter, or native mobile apps with modern
Develop React Native, Flutter, or native mobile apps with modern
Ensure ATS-friendly formatting and create clean scannable layouts
AWS Secrets Manager for secure secret storage and rotation. Use when storing credentials, configuring automatic rotation, managing secret versions, retrieving secrets in applications, or...
Master Flutter development with Dart 3, advanced widgets, and
Master Flutter development with Dart 3, advanced widgets, and
Master Flutter development with Dart 3, advanced widgets, and
Expert DevOps troubleshooter specializing in rapid incident
Expert DevOps troubleshooter specializing in rapid incident
Expert DevOps troubleshooter specializing in rapid incident
Expert in compliance frameworks (SOC2, ISO 27001), automated auditing, and risk management.
Optimize LinkedIn profile for searchability, recruiter visibility, and engagement
Autonomous penetration testing framework. Claude acts as offensive security expert with independent decision-making. Provides methodology and principles, not command scripts. ALL commands must...
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.
Coordinate multi-layer security scanning and hardening across application, infrastructure, and compliance controls.