Threat modeling | secure coding | bug bounty | smart contract security | CIS | network protocols | web protocols | software supply chain | cryptography | SOC 2 | ISO 27001 | NIST | incident response | PKI | TypeScript | Rust | observability | AWS | CI/CD | vulnerability management Threat modeling | secure coding | bug bounty | smart contract security | CIS | network protocols | web protocols | software supply chain | cryptography | SOC 2 | ISO 27001 | NIST | incident response | PKI | TypeScript | Rust | observability | AWS | CI/CD | vulnerability management