Configure mutual TLS (mTLS) for zero-trust service-to-service communication. Use when implementing zero-trust networking, certificate management, or securing internal service communication.
Configure mutual TLS (mTLS) for zero-trust service-to-service communication. Use when implementing zero-trust networking, certificate management, or securing internal service communication.
Use when designing or building modern web applications in JavaScript/TypeScript (SPA/SSR/SSG/ISR/RSC): architecture trade-offs, state/data patterns, performance, testing, delivery, and team scaling.
Expert Terraform/OpenTofu specialist mastering advanced IaC
Expert Terraform/OpenTofu specialist mastering advanced IaC
Expert Terraform/OpenTofu specialist mastering advanced IaC
Expert Terraform/OpenTofu specialist mastering advanced IaC
Provides comprehensive AWS (Amazon Web Services) guidance including EC2, S3, RDS, Lambda, ECS/EKS, CloudFormation, API Gateway, CloudFront, cloud migration from on-premise/GCP/Azure, security...
Expert deployment engineer specializing in modern CI/CD pipelines,
Expert deployment engineer specializing in modern CI/CD pipelines,
Expert deployment engineer specializing in modern CI/CD pipelines,
Expert deployment engineer specializing in modern CI/CD pipelines,
Test for security vulnerabilities using OWASP principles. Use when conducting security audits, testing auth, or implementing security practices.
Optimize resumes for Applicant Tracking Systems, check ATS compatibility, and analyze keyword match
Expert hybrid cloud architect specializing in complex multi-cloud
Expert hybrid cloud architect specializing in complex multi-cloud
Expert hybrid cloud architect specializing in complex multi-cloud
Expert hybrid cloud architect specializing in complex multi-cloud
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security...