Security. Automation. Analytics
"The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency".
Reverse engineering, exploit development, fuzzing, and penetration testing.