Red Team
Offensive security specialists who simulate attacks to test defenses and identify vulnerabilities.
Penetration Testing
Social Engineering
Exploit Development
OSINT
Blue Team
Defensive security experts who monitor, detect, and respond to cyber threats and incidents.
SIEM
Incident Response
Threat Hunting
Forensics
Purple Team
Bridge between red and blue teams, combining offensive and defensive security expertise.
Threat Modeling
Security Testing
Risk Assessment
Collaboration
Ethical Hacker
Authorized security professionals who use hacking techniques to find and fix vulnerabilities.
Web App Security
Network Security
Mobile Security
Bug Bounty
Cloud Security
Specialists in securing cloud infrastructure, applications, and data across various cloud platforms.
AWS Security
Azure Security
Container Security
DevSecOps
Social Engineering
Ethical human hackers specializing in psychological manipulation to test organizational defenses.
Psychology
Pretexting
OSINT
Vishing
DevSecOps Engineer
Integrates security into the CI/CD pipeline, automating checks throughout the software lifecycle.
CI/CD
IaC Security
SAST/DAST
Policy as Code