(Design, Implementation, Security)
(High-Severity Finding Researcher)
(Vulnerability Assessment)
(Malware Analysis, Reverse Engineering)
(Hacking, Phishing, Social Engineering)
(Red Teaming, Advanced Persistent Threats)