Auth & Security
Authentication, authorization, and API security implementation
Authentication, authorization, and API security implementation
Construct secure, efficient CI/CD pipelines with supply chain security (SLSA), monorepo optimization, and caching
Master plan for implementing compliance frameworks including SOC 2, PCI-DSS, HIPAA, GDPR with compliance as code patterns
Implement SOC 2, HIPAA, PCI-DSS, and GDPR compliance with unified controls and automation
Master plan for firewall configuration including iptables, cloud security groups, network policies, and defense patterns
Configure host-based firewalls, cloud security groups, and network policies
Master plan for TLS/SSL implementation including certificate generation, automation, mTLS, and modern cipher suites
Configure TLS certificates and encryption for secure communications
Secure storage, rotation, and delivery of secrets with Vault and Kubernetes
Master plan for security architecture including defense in depth, zero trust, threat modeling, and security controls
Design comprehensive security architectures using defense-in-depth, zero trust, and threat modeling
Multi-layer security hardening across OS, containers, cloud, network, and database with CIS Benchmark mapping
Reduce attack surface across OS, container, cloud, network, and database layers
Master plan for SIEM and centralized logging including detection rules, log aggregation, and security monitoring
Configure SIEM systems for threat detection, log aggregation, and compliance
Master plan for vulnerability management including scanning tools, SBOM generation, prioritization, and remediation workflows
Multi-layer security scanning, SBOM generation, and risk-based vulnerability prioritization
Write optimized, secure, multi-stage Dockerfiles with language-specific patterns and distroless images