How does one become a cyber security researcher? Find out in this ...