SecurePath Wayne Howlett
Skill

Threat Modeling

Model threats clearly and connect them to controls and verification.

Strong80%Evidence-first
Proficiency
5 capability2 tool2 working on
Capabilities
  • STRIDE-style reasoning
    LabWriteup
  • Attack surface → mitigations
    Writeup
  • Abuse cases & misuse paths (API-focused)
    LabWriteup
  • Trust boundary identification + assumptions
    Writeup
  • Risk notes + evidence mapping
    Report
Tools
  • Threat modeling templates
    Writeup
  • MITRE ATT&CK mapping (when relevant)
    Writeup
Working On
  • Reusable threat model format for portfolio projects
    Planned
  • Risk register + control validation workflow
    Planned
Next steps

This page will grow into proof blocks (labs, writeups, artifacts) as you attach evidence.