Current security and workflow toolkit
Compute Engine / IAM / KMS / Kubernetes Engine and Cloud SQL
DNS / Edge Computing (Workers) / Reverse Proxy
IaC / Modules for tool deployment / Automation
Config Management / Task Orchestration
Git server / CI/CD Automation / Build agent
Selfhosted DB / In-cluster DB / Managed DB
Vulnerability Scanning / Exposure Management / ASV
WAF / API Shield / DDoS Protection / TLS
SAST / Software Composition Analysis / SBOM
EDR / XDR / Incident Respone / STAR Automation
Identity Provider / SSO / Joiner-Mover-Leaver Automation / Exchange Server
Mobile Device Management
MacOS Centralized Management
Centralized Logging / SIEM / Monitoring and Alerting / Incident Response and Investigation
Distributed Tracing, Incident Response, APM
VPN Server and Client
IP address data enrichment
ReverseIP Lookups / ReverseDNS Lookups / Investigations
Attack Surface Mapping / OSINT
SAST / SCA
Host-based IDS/IPS
Phishing Simulation / Security Awareness Training
Threat Modeling
What you use it for / approach / key insight
API testing / Documentation
IDE
AI IDE
Love/Hate relationship
Working with GCP / Scripting
Enumeration / Scripting
Attack Surface Mapping
SSH-ing into things