Architecture (ZTA) principles, Software[1]Defined Perimeter (SDP), identity-aware proxy architectures, 802.1X authentication, certificate-based authentication, policy-based access control, stateful/stateless firewall technologies, threat intelligence integration, and network segmentation strategies. Expertise in security policy modelling, documentation of end-to-end security workflow specifications (e.g., threat models, security … security scanning, security automation frameworks, and version control for security configurations. Working knowledge of cloud-native security services: Cloud Access Security Brokers (CASB), cloud firewall services, identity federation, secure access service edge (SASE), zero trust network access platforms, security posture management, and cloud IAM integration. Compliance and Regulatory Controls - Strong ...