Skill
Threat Modeling
Model threats clearly and connect them to controls and verification.
Strong80%Evidence-first
Proficiency
5 capability2 tool2 working on
Capabilities
- STRIDE-style reasoningLabWriteup
- Attack surface → mitigationsWriteup
- Abuse cases & misuse paths (API-focused)LabWriteup
- Trust boundary identification + assumptionsWriteup
- Risk notes + evidence mappingReport
Tools
- Threat modeling templatesWriteup
- MITRE ATT&CK mapping (when relevant)Writeup
Working On
- Reusable threat model format for portfolio projectsPlanned
- Risk register + control validation workflowPlanned
Next steps
This page will grow into proof blocks (labs, writeups, artifacts) as you attach evidence.