Create operational runbooks, playbooks, standard operating procedures (SOPs), and incident response guides. Use when...
cat ~/Top
Browse top skills sorted by GitHub stars
Implement secrets management with HashiCorp Vault, AWS Secrets Manager, or Kubernetes Secrets for secure credential...
Implement automated secrets rotation for API keys, credentials, certificates, and encryption keys. Use when managing...
Implement comprehensive security audit logging for compliance, forensics, and SIEM integration. Use when building...
Conduct comprehensive security compliance audits for SOC 2, GDPR, HIPAA, PCI-DSS, and ISO 27001. Use when preparing...
Create security policies, guidelines, compliance documentation, and security best practices. Use when documenting...
Configure HTTP security headers including CSP, HSTS, X-Frame-Options, and XSS protection. Use when hardening web...
Identify security vulnerabilities through SAST, DAST, penetration testing, and dependency scanning. Use for security...
Implement semantic versioning (SemVer) with automated release management. Use conventional commits,...
Classify text sentiment using NLP techniques, lexicon-based analysis, and machine learning for opinion mining, brand...
Implement server-side rendering with template engines, view layers, and dynamic content generation. Use when...
Design and implement serverless applications using AWS Lambda, Azure Functions, and GCP Cloud Functions with...
Implement service mesh (Istio, Linkerd) for service-to-service communication, traffic management, security, and...
Implement secure session management systems with JWT tokens, session storage, token refresh, logout handling, and...
Build enterprise Spring Boot applications with annotations, dependency injection, data persistence, REST...
Prevent SQL injection attacks using prepared statements, parameterized queries, and input validation. Use when...
Analyze and optimize SQL queries for performance. Use when improving slow queries, reducing execution time, or...
Manage SSL/TLS certificates with automated provisioning, renewal, and monitoring using Let's Encrypt, ACM, or Vault.
Manage stakeholder expectations and engagement through targeted communication, regular updates, and relationship...
Implement static code analysis with linters, formatters, and security scanners to catch bugs early. Use when...
Conduct statistical tests including t-tests, chi-square, ANOVA, and p-value analysis for statistical significance,...
Implement stored procedures and functions for database logic. Use when creating reusable database routines, complex...
Test system behavior under extreme load conditions to identify breaking points, capacity limits, and failure modes....
Analyze time-to-event data, calculate survival probabilities, and compare groups using Kaplan-Meier and Cox...