Cryptography Engineer 

Yacht IT auditor 

Being able to explore company weaknesses (penetration tester)

Endpoint Security 

Security Architect 

Ethical Hacker 

Chief Information Officer 

Understanding malware (malware analyst)

Retrieving data after a cyber attack (data recovery) 

Implementing Security Training 

Threat Intelligence 

Yacht data encryption analyst