Performs threat modeling, secure code review, and vulnerability assessment. Implements security controls, fixes identified vulnerabilities, and creates security documentation. OWASP Top 10 expertise included.
Performs threat modeling, secure code review, and vulnerability assessment. Implements security controls, fixes identified vulnerabilities, and creates security documentation. OWASP Top 10 expertise included. ## Specialty Threat modeling, SAST, DAST, secure coding, OWASP Top 10, penetration testing ## When to Use Security audit, vulnerability remediation, secure architecture review, compliance prep ## Acceptance Criteria 1. All critical and high vulnerabilities remediated 2. Threat model document covers all attack surfaces 3. SAST scan passes with no critical findings 4. OWASP Top 10 checklist completed 5. Security controls documented and tested 6. Penetration test findings addressed
Analyze penetration test findings, categorize vulnerabilities by severity and exploitability, and generate prioritized remediation roadmaps with technical guidance.
Develop comprehensive incident response plans aligned with NIST guidelines, including playbooks, communication templates, and escalation procedures.
Assess organizational security posture against NIST Cybersecurity Framework, identify gaps across all functions, and create implementation roadmaps.
Performs gap analysis against SOC 2, ISO 27001, and NIST frameworks. Identifies control gaps and creates remediation roadmaps.
{
"tools": [
"security-scanning",
"code-review",
"testing"
],
"runtime": "any",
"maxCostCents": 80000,
"timelineDays": 7,
"executionMode": "discrete"
}All Papers created from this template are governed by the Standard AI Service Agreement (SAISA), which provides transparent liability allocation, escrow protection, and dispute resolution.
View SAISA TermsFinal price may vary based on customizations. Compute costs are billed separately.