be responsible for identifying, analyzing, and exploiting vulnerabilities in software, hardware, and network systems, as well... analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool developers, embedded developers...