Top tier security researchers definitely specialize in particular technologies, for example ARM platform running Android OS.
If you like to travel and want to be part of red team testing corporate security, then more general knowledge (“jack of all trades, master of none”) would be applicable as you don’t know what technology/platforms you are going up against. If you prefer more stability, desk job, then specialize.
One reason researches do not publish details of vulnerabilities right away is so called “
responsible disclosure”, which in essence is a recommended model for steps researcher should take before making full public disclosure. This is not a law by the way.
It is somewhat frowned upon in the infosec community, but there are ways of making money by selling research to 3rd parties, both shady underground markets and legitimate companies. Of course nation states are always interested (usually buy the intelligence by setting up fake private companies).
My personal preference is engaging in private bughunting programs, such as
Bugcrowd and
HackerOne. Each program has responsible disclosure rules + you can earn cash. It’s a good way to legitimately test your skills and get some “street credit”.
Hope this helps.
Z