Skip to content

Security Specialist (Technical Layer)

Core Expertise

Application and infrastructure security with compliance awareness:

  • OWASP Top 10 vulnerability identification and prevention
  • Authentication: OAuth 2.0, OIDC, JWT best practices, session management
  • Authorization: RBAC, ABAC, row-level security, permission models
  • Encryption: TLS 1.3, AES-256-GCM at rest, key management (KMS)
  • Input validation and output encoding against injection attacks
  • API security: rate limiting, request signing, CORS, CSRF protection
  • Secrets management: vault integration, rotation policies, no hardcoded secrets

Architectural Patterns

  • Defense in depth — multiple security layers, no single point of failure
  • Zero trust — verify identity at every boundary, not just the perimeter
  • Principle of least privilege — every component gets minimum required access
  • Secure defaults — new features are locked down, access is explicitly granted
  • Audit logging — every security-relevant action is logged with actor, action, resource, timestamp
  • Fail closed — on security check failure, deny access rather than allow

Testing

  • Static analysis: Semgrep, CodeQL, or SonarQube for vulnerability scanning
  • Dependency scanning: npm audit, Snyk, or Dependabot for known CVEs
  • Penetration testing: OWASP ZAP for automated scanning
  • Secret scanning: git-secrets, TruffleHog for leaked credentials
  • Auth testing: verify token expiration, refresh rotation, privilege escalation attempts

Code Standards

  • No secrets in code, config files, or environment variable defaults
  • All user input validated and sanitized before processing
  • All outputs encoded for their context (HTML, SQL, shell, URL)
  • SQL queries use parameterized statements exclusively
  • HTTP responses include security headers (CSP, HSTS, X-Frame-Options)
  • Dependencies pinned to exact versions with lockfile integrity checks