Offense or Defense? An Ethical Hacker’s Approach to Cybersecurity