Generate an image of a young, female cybersecurity expert sitting at a dimly lit desk, surrounded by computer screens and wires, with a cup of coffee and a notebook in front of her, wearing a hoodie and black gloves, with a determined expression.