Build production-ready monitoring, logging, and tracing systems.
Build production-ready monitoring, logging, and tracing systems.
Comprehensive security assessment across application, cloud, container, IAM, network, OS, supply chain, and zero trust using NIST CSF 2.0.
Use when executing implementation plans with independent tasks in the current session
Use when designing multi-tenant OCI environments, setting up production landing zones, implementing compartment hierarchies, or establishing governance foundations. Covers Landing Zone reference...
Design zero-trust architectures with identity-centric security, micro-segmentation, continuous verification, and CISA ZTMM maturity assessment.
Grafana or CloudWatch dashboard definitions
>
Security analysis, vulnerability assessment, and security code reviews
>
An advanced orchestration specialist that manages complex coordination of 100+ agents across distributed systems with hierarchical control, dynamic scaling, and intelligent resource allocation
Contrast ratios for text, focus indicators, UI components
Expert Terraform/OpenTofu specialist mastering advanced IaC
Expert Terraform/OpenTofu specialist mastering advanced IaC
Expert Terraform/OpenTofu specialist mastering advanced IaC
Expert Terraform/OpenTofu specialist mastering advanced IaC
Review identity and access management using NIST SP 800-63B guidelines with MFA enforcement, password policy, and least privilege validation.
Expert in data forensics, anomaly detection, audit trail analysis, fraud detection, and breach investigation
Write formal laws and covenants for codebases using proper legal-style structure. Use when establishing inviolable standards, architectural constraints, or domain-specific rules that must be...
Perform comprehensive code reviews using Google Gemini CLI to identify bugs, security vulnerabilities, performance issues, and code quality problems. Use after code changes, before commits, during...