C – Create app that rates software
Y – Yacht GPS software that I secure
B – Bug bounty hunting
E – Ethical Hacking
R – Risk/Vulnerability testing
S – Security architecture designing
E – Encryption services
C – Cloud security specialist
U – Undercover intrusion testing
R – Reporting risks in the infrastructure and monitoring them
I -Incident response planning
T – Threat detection
Y – Yara Development