SECUREPATH

Skills

Filter by level, then search for skills, tools, or even evidence tags (try: Lab, Project, Report). Tip: press / to jump to search.

Sections
8
Core capability areas
Avg. Proficiency
78%
Self-rated confidence across sections
Active Improvements
13
Items currently in progress
/
Showing 8 sections
Expert (Green/Teal)
Core strength — I can lead or own this area.
Strong (Cyan)
Very solid — I can explain and apply confidently.
Good (Indigo)
Comfortable — I can contribute, still leveling up.
Working On (Amber)
Actively improving — highlighted in “Working on next”.
Evidence badges
Hands-OnLabProjectReportWriteupCertArchitectureDemoIn Progress

These help employers see what’s backed by labs/projects/reports vs what’s currently in progress.

Security Architecture

Designing secure systems with clear trust boundaries, controls, and proof.

Expert
Proficiency88%

Key Skills

Threat modeling mindsetZero Trust principlesDefense-in-depthNetwork segmentation conceptsRisk-based decisionsSecurity documentation & writeups

Working on next

More architecture diagramsControls mapping (NIST/CIS style)

Tools / Tech

DiagramsWriteups

Evidence

Full-Stack Engineering

Building modern web apps end-to-end — including SQL and JSON-heavy workflows.

Expert
Proficiency86%

Key Skills

Next.js / ReactTypeScriptSQL (joins, filtering, aggregations)Relational data modeling conceptsJSON (APIs, configs, data exchange)Client ↔ server data flowGit workflows

Working on next

Advanced SQL / optimizationAPI-backed persistence demos

Tools / Tech

Next.jsSQLJSONGit/GitHubVercel

Evidence

API Security

Practical API defense: auth patterns, validation, and abuse prevention.

Strong
Proficiency82%

Key Skills

JWT/OAuth conceptsLeast privilege / scoped accessInput validation & safe errorsRate limiting conceptsOWASP awareness (web + API)

Working on next

OWASP API Top 10 deeperAPI abuse-case threat modeling

Tools / Tech

REST/JSONPostman/curlNext.js

Evidence

Vulnerability Management

Scanning, prioritizing, and documenting remediation.

Strong
Proficiency76%

Key Skills

Nessus scan interpretationGreenbone / OpenVAS scanningRisk prioritization & reportingRemediation planning & verification

Working on next

Scan → fix → rescan writeups

Tools / Tech

NessusGreenbone/OpenVASLinux

Evidence

Detection, Logging & Incident Response

Visibility + response workflows using real lab tools.

Strong
Proficiency78%

Key Skills

Logging fundamentalsAlert tuning conceptsIR workflow basicsHost monitoring mindset

Working on next

Investigation playbooks

Tools / Tech

Wazuh (lab)Linux CLI

Evidence

Threat Intelligence & MITRE ATT&CK

Mapping threat report behaviors to ATT&CK and explaining tradecraft.

Good
Proficiency70%

Key Skills

ATT&CK mapping from reportsThreat report analysisTurning narrative into controls (conceptual)

Working on next

More ATT&CK case studies (screenshots)

Tools / Tech

MITRE ATT&CKThreat reports (PDFs)

Evidence

Cloud Security

Cloud-ready security fundamentals and secure deployment habits.

Good
Proficiency66%

Key Skills

Shared responsibility (conceptual)IAM concepts (roles, least privilege)Environment separation (dev/test/prod)Secrets hygiene

Working on next

CI/CD security basicsCloud logging patterns

Tools / Tech

VercelGitHub

Evidence

BI & Reporting

Excel + Power BI reporting and dashboard thinking.

Strong
Proficiency77%

Key Skills

Excel analysisPower BI dashboardsKPI/reporting mindset

Working on next

More SQL reporting patternsSecurity metrics dashboards

Tools / Tech

ExcelPower BI

Evidence