- Web Application Pentesting
- WordPress Hacking
- Cloud Infrastructure Exploitation
- Network Log Analysis
- Malware Analysis
- Email Analysis
- Firewall Configuration
- SIEM Implementation
- IPS / IDS Deployment
- Patching
- Encryption
- Backups
- Python / Bash Script
- Configuration Management
- Infrastructure as Code (IaC)
- Data Policies
- Identity and Access Management (IAM)
- Events and Monitoring
- Standard Operating Procedures (SOPs)
- Statement of Work (SOW)
- Technical Documentation