Application Security
I find what an attacker would find — first. OWASP assessments, secure API design reviews, and penetration testing for systems that can't afford to leak.
- ▸OWASP Top 10 & SAMM assessments
- ▸Secure API design (OAuth2 · JWT · RBAC)
- ▸Penetration testing & threat modeling
- ▸Compliance audits (GDPR · ISO 27002)