Cryptography
analYst (information security)
Bug Bounty Hunter
Engineering (Systems and Security)
foRensic expert
Security software developer
Ethical Hacker
Chief Information Security Officer
consUltant (Security)
peneTration tester
Indicent responder
archiTect (Security)
crYptanalyst