Professionals who: Audit systems for vulnerabilities. Help design secure architectures. Conduct penetration tests (authorized attack simulations). Work in “Red Teams” (attack simulation) or “Blue Teams” (defense).