π―Skills85
Skill
Skill
Automates Google Kubernetes Engine (GKE) cluster provisioning, configuration, and security hardening using best practices and infrastructure-as-code principles.
Generates comprehensive business continuity and disaster recovery plans by analyzing infrastructure configurations, identifying potential risks, and recommending resilience strategies across cloud ...
Performs automated static application security testing (SAST) on source code to identify potential security vulnerabilities and coding risks before deployment.
Automates database backup strategies, generating secure, consistent backup configurations and scripts across multiple database systems and cloud platforms.
Validates and recommends security configurations for infrastructure and systems against Center for Internet Security (CIS) benchmark standards and best practices.
Manages SSL/TLS certificate lifecycle, including generation, validation, rotation, and secure configuration across infrastructure and cloud environments.
Skill
Skill
Skill
Skill
Skill
Skill
Skill
Skill
Configures and and retrieves performance metrics and and monitoring configurations for New New Rinfrastructure infrastructure and application performance tracking.
Manages and analyzes feature flag configurations across different environments, helping teams safely roll out and control software features dynamically.
Generates and manages Google Cloud Platform infrastructure configurations using Terraform, automating cloud resource provisioning and deployment.
Configures and sets up secure reverse proxy configurations for routing and protecting web traffic across different infrastructure environments.
Skill
Skill
Skill
Generates and manages Azure cloud infrastructure configurations using Terraform, automating resource provisioning and deployment with best practices and security considerations.
Helps DevOps professionals quickly audit, analyze, and generate secure AWS IAM policies, roles, and access configurations with best practice recommendations.
Configures and manages log aggregation using Loki, enabling centralized logging and analysis for distributed systems and Kubernetes environments.
Automates GitOps deployment workflows for Kubernetes clusters using ArgoCD, enabling declarative and version-controlled infrastructure management.
Skill
Skill
Skill
Skill
Generates and validates Azure Resource Manager (ARM) templates for consistent, repeatable cloud infrastructure deployments in Azure environments.
Configures and sets up monitoring dashboards in Grafana using Prometheus metrics for comprehensive infrastructure and application performance tracking.
Provides expert Linux system administration guidance, including server hardening, configuration management, security best practices, and troubleshooting commands for DevOps professionals.
Generates, validates, and manages Helm chart templates and configurations for Kubernetes deployments, ensuring consistent and reproducible infrastructure-as-code.
Manages user account lifecycle, access controls, and permissions across cloud platforms and infrastructure, automating user onboarding, offboarding, and role assignments.
Skill
Manages cloud block storage provisioning, configuration, and security best practices across multiple cloud providers like AWS, Azure, and GCP.
Configures and deploys an ELK (Elasticsearch, Logstash, Kibana) stack for centralized log management, monitoring, and analysis of infrastructure and application logs.
Automates Kubernetes cluster management, security hardening, and operational tasks like deployment configuration, resource scaling, and security context setup.
Automates secure VPN configuration and deployment across cloud environments, generating network-specific configurations and implementing best-practice security settings.
Generates and configures Azure network security groups, virtual networks, subnets, and firewall rules to establish secure and compliant network architectures in Azure cloud environments.
Automates Jenkins pipeline configuration, security hardening, and best practice implementation for continuous integration and deployment workflows.
Automates incident response workflows by providing step-by-step guidance, tracking resolution progress, and generating post-mortem reports for DevOps and security teams.
Scans project dependencies for known security vulnerabilities, identifying potential risks in software libraries and packages across different programming languages and ecosystems.
Generates comprehensive disaster recovery plans and scripts for cloud infrastructure, automating backup, restoration, and failover strategies across multi-cloud environments.
Automates tracking, reviewing, and approving infrastructure and configuration changes across DevOps environments to ensure compliance and minimize risk.
Automates on-call alert routing, escalation, and notification workflows for DevOps and security incidents across multiple communication channels and incident management platforms.
Automates Linux server security hardening by generating and applying recommended sysctl configurations, firewall rules, and security best practices.
Automates secure retrieval, management, and rotation of secrets and credentials from HashiCorp Vault across infrastructure and application deployments.
Retrieves, manages, and securely rotates AWS Secrets Manager credentials and configuration secrets for infrastructure and application deployments.
Generates and validates firewall configuration rules for cloud and on-premises environments, ensuring network security and compliance across different infrastructure platforms.
Discovers, catalogs, and maps infrastructure assets across cloud providers and on-premises environments, generating a comprehensive inventory of resources and configurations.
Manages DNS configurations, records, and zones across cloud providers, enabling automated DNS setup, modification, and security hardening for infrastructure.
Automates Azure DevOps pipeline configuration, security assessments, and infrastructure management tasks using AI-driven recommendations and best practices.
Automates comprehensive backup and disaster recovery strategies for cloud and on-premises infrastructure, generating resilient recovery plans and executing systematic data protection workflows.
Retrieves and analyzes Azure Monitor logs and metrics to perform comprehensive security and compliance audits across Azure cloud resources.
Scans infrastructure, containers, and cloud configurations for security vulnerabilities, misconfigurations, and potential compliance risks across multiple platforms and technologies.
Automates Windows server security configuration by applying recommended hardening settings, disabling unnecessary services, and implementing best-practice security policies.
Configures and secures Google Cloud Platform network settings, firewall rules, VPC networks, and subnets with best practices and automated provisioning.
Automates secure configuration, monitoring, and hardening of Google Cloud SQL database instances with best practices for access control, encryption, and network security.
Configures and deploys a Web Application Firewall (WAF) with recommended security settings across cloud platforms and infrastructure environments.
Generates comprehensive, structured runbooks for DevOps and security incident response workflows, automating documentation of step-by-step procedures and best practices.
Generates comprehensive security and compliance audit logs for infrastructure, tracking critical events, access attempts, and configuration changes across cloud and on-premises environments.
Analyzes and recommends optimizations for system resources, compute performance, and infrastructure configurations to improve application and infrastructure efficiency.
Automates AWS S3 bucket security assessments, scanning for misconfigurations, access policies, and potential data exposure risks.
Automates PCI DSS compliance checks and generates remediation recommendations for cloud infrastructure and application configurations.
Generates and validates GitLab CI/CD pipeline configurations, offering intelligent recommendations for optimizing and securing continuous integration workflows.
Generates and manages AWS infrastructure configurations using Terraform, automating cloud resource provisioning and ensuring consistent, repeatable cloud deployments.
Helps configure, secure, and manage Azure SQL database instances with best practices, connection settings, and security hardening recommendations.
Helps DevOps teams systematically assess, track, and manage third-party vendor security risks, compliance requirements, and technology integrations.
Helps generate, customize, and manage Kubernetes resource configurations by applying overlays and patches to base Kustomize manifests efficiently.
Generates, configures, and secures AWS Lambda function infrastructure with best practices, including IAM roles, event sources, and deployment strategies.
Encrypts and decrypts sensitive configuration files using Mozilla SOPS, enabling secure management of secrets across different cloud environments and infrastructure-as-code workflows.
Reviews and analyzes access permissions across cloud infrastructure, identifying potential security misconfigurations and overly permissive roles or policies.
Helps DevOps teams automatically assess and validate infrastructure configurations against ISO 27001 information security management system (ISMS) compliance requirements.
Automates security configuration, vulnerability scanning, and compliance checks across cloud infrastructure and container environments.
Configures and hardens SSH server settings to improve security, implementing best practices like key-based authentication, disabling root login, and setting strict access controls.
Scans container images for security vulnerabilities, misconfigurations, and potential risks using industry-standard scanning tools and best practices.
Generates comprehensive security configurations and best practices for hardening Docker containers, focusing on reducing attack surfaces and implementing defense-in-depth strategies.
Analyzes cloud infrastructure configurations and code repositories to identify potential HIPAA compliance violations and recommend remediation steps.
Automates Windows Server security hardening, configuration management, and compliance checks using predefined best practices and expert-curated scripts.
Configures and manages Network File System (NFS) storage resources, providing automated setup and security best practices for distributed file storage in cloud and on-premises environments.
Automates provisioning, configuration, and security hardening of AWS ECS Fargate container deployments with best practices and infrastructure-as-code templates.
Automates PostgreSQL database security hardening, configuration management, and best practices implementation for DevOps and cloud infrastructure.