This is a companion to the Security Engineer Questions
☆205Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for Security_Architect_and_Principal_Security_Engineer_Interview_Questions
Users that are interested in Security_Architect_and_Principal_Security_Engineer_Interview_Questions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Every Security Engineer Interview Question From Glassdoor.com☆1,258Mar 2, 2024Updated 2 years ago
- Websec interview questions by tib3rius answered☆308Nov 13, 2023Updated 2 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.☆15Sep 19, 2023Updated 2 years ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆440Dec 28, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆2,456Feb 2, 2026Updated last month
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Sep 19, 2023Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Sep 7, 2023Updated 2 years ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆681Aug 7, 2020Updated 5 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago
- ssh jump host appliance☆26Mar 23, 2022Updated 4 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,038Dec 21, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,908Oct 1, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆290Feb 5, 2024Updated 2 years ago
- ☆382Apr 18, 2024Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Jan 12, 2024Updated 2 years ago
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆650Updated this week
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆130Jul 14, 2024Updated last year
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- ☆32Mar 12, 2026Updated last week
- ☆192Apr 16, 2025Updated 11 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,724Aug 2, 2024Updated last year
- ☆16Jul 17, 2024Updated last year
- ☆114Jun 8, 2023Updated 2 years ago
- Dynamically generate and hunt with Lacework LQL queries quickly and efficiently☆27Sep 29, 2023Updated 2 years ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆36Feb 28, 2025Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Automating Security Detection Engineering, published by Packt☆67Oct 12, 2024Updated last year
- INACTIVE - Experiment: A light-weight agent to get a port scan perspective into a useable place/format for security operations☆14Apr 10, 2023Updated 2 years ago
- A repository of breaches of AWS customers☆798Mar 11, 2026Updated 2 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Dropbox LLM Security research code and results☆256May 21, 2024Updated last year
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆256Aug 31, 2022Updated 3 years ago
- A crowdsourced Azure RBAC permissions reference.☆17Jul 9, 2025Updated 8 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆981Sep 2, 2024Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆32Apr 21, 2023Updated 2 years ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,409Jun 24, 2025Updated 9 months ago