Loading...
Loading...
Found 14 Skills
Specialized auditor for SOC2, HIPAA, GDPR, and regulatory compliance frameworks across industries
Information Security Management System auditing for ISO 27001 compliance, security control assessment, and certification support
Comprehensive Docker security guidelines and threat mitigation strategies
Expert in data forensics, anomaly detection, audit trail analysis, fraud detection, and breach investigation
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detec...
Database security, access control, and data protection
Reduces attack surface across OS, container, cloud, network, and database layers using CIS Benchmarks and zero-trust principles. Use when hardening production infrastructure, meeting compliance requirements, or implementing defense-in-depth security.
Apply Gremlin's enterprise chaos engineering methodology. Emphasizes categorized failure injection, safety controls, and structured experimentation. Use when implementing chaos engineering in enterprise environments with compliance requirements.
Use when investigating inbox placement, reputation, and compliance signals across senders.
Maps security requirements to implementation. Coordinates compliance against FIPS 140-3, OCF, CommonCriteria, and Tizen specification.
Maps technical state to regulatory standards (SOC2, ISO27001, etc.). Generates real-time compliance scores and audit-ready evidence reports.
Comprehensive security and authentication workflow that orchestrates security architecture, identity management, access control, and compliance implementation. Handles everything from authentication system design and authorization frameworks to security auditing and threat protection.