Cybersecurity analyst
Youtuber blogger or influencer
Bug bounty hunter
Ethical hackers get rewards by attacking legally their systems.
Recommendation for improvement after auditing a system
Security consultant
Educating by becoming a cybersecurity teacher.
Creating security tools
Updating new security systems
Research in projects
Identifying vulnerabilities in systems
Testing networks or systems for vulnerabilities
Yielding budgets for security expenses