You have a strong affinity with cybersecurity. You have knowledge of security monitoring tools, network protocols, network analysis tools and operating systems. You follow new cyberattack techniques ...