For this assignment, I was required to write about any cybersecurity related career that I chose. I was directed to find connections between the career and the elements I’ve learned from the class overall while also acknowledging the issues marginalized groups faced and the contributions towards society that the job gave. For the career choice, I chose information security analyst, as I read that it was a common job and could also be a possible entry-level job.
Information Security Analyst
An information security analyst is one of the many different jobs available in the field of cybersecurity. Typically, information security analysts monitor and investigate security breaches, simulate security breaches to check for vulnerabilities, document breaches, and help enhance technological security overall (Bureau of Labor Statistics 2018). This job role plays an important part of the organization especially if breaches or technological disasters were to occur, as they’re trained to be prepared and to prepare IT workers in case of breaches.
Connection with social science principles
The principles of social science and the tasks and role that information security analysts have are heavily intertwined with one another. An analyst must take the principles of relativism and determinism into account when investigating the cause of breaches and when making security measures to mitigate future breaches, they must also stay objective as values should not be in the way of the safety of their organization’s data. Parsimony is also important to this job, as information security analysts are expected to help IT employees in case of breach and give them directions, all of which should be handled with professionalism and as simple as possible explanations.
4 Key concepts from class
A few key concepts from class come to mind when thinking of what an information security analyst must do. Two of the more obvious key concepts are professional subculture, where the employee must think about protecting the organization’s data rather than taking data from others, and the CIA Triad, where the employee must think about confidentiality, integrity, and availability when handling data and creating security measures. Two more key factors are the consideration of human factors when proposing security enhancements (as human error is the leading cause of most breaches) and the awareness of phishing and other common hacking tactics, which will most likely occur with typical employees.
3 Issues Connecting to Marginalized Groups
Although the job of an information security analyst may seem attractive, there are a few issues it may have because it is a job related to STEM and cybersecurity, these issues mostly correlating around the marginalized group of women. There is a gender gap in the field of cybersecurity, where women are more of the minority compared to men. Unfortunately, due to this gender gap, women may be prone to experiencing gender discrimination, an article by Poster claiming that 51% of women have experienced gender discrimination like tokenism or more highlights of mistakes. Women in this field may also experience a struggle in career advancement, as there could be denials and delays that would typically be handed over by men.
Not only is there gender discrimination in the field, but there is also a lack of female representation in the career field in general. When searching for jobs, many may be repelled when there is a lack of representation or an assumption of gender, which can be seen according to a paper, saying that “Online cybersecurity job postings often lack gender-neutral language” (Kshetri et al. 2022).
Connection to society
Information security analysts play an extremely important role in an organization’s security. Their role is to develop plans in case of data breaches or technological disasters and help other employees (especially those in IT) avoid or recover from the disaster to continue the organization’s normal operation. Information security analysts must research and keep up with information security trends (Peterson 2020) to propose security enhancements for the company and to edit disaster plans if necessary. Without information security analysts, an organization may have to suffer unrecoverable data losses from breaches and may even have to pause operations.
Citations
Bureau of Labor Statistics. (2025, April 18). Information Security Analysts. U.S. Bureau of Labor Statistics. https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-1
Kshetri, N., & Chhetri, M. (2022). Gender Asymmetry in Cybersecurity: Socioeconomic Causes and Consequences. Computer (00189162), 55(2), 72–77. https://doi-org.proxy.lib.odu.edu/10.1109/MC.2021.3127992
Peterson, B. (2020). information security analyst. Elementary STEM Journal, 25(2), 35. Retrieved April 27, 2025, from https://research-ebsco-com.proxy.lib.odu.edu/linkprocessor/plink?id=11dedf0d-d128-3011-b4b6-26e62cbe468f
Poster, W. R. (2018). Cybersecurity needs women. Nature (London), 555(7698), 577–580. https://doi.org/10.1038/d41586-018-03327-w
S. Bagchi-Sen, H. R. Rao, S. J. Upadhyaya and S. Chai. (2010). Women in Cybersecurity: A Study of Career Advancement. IT Professionals, 12(1), 21-31. Retrieved April 27, 2025, from https://ieeexplore.ieee.org/abstract/document/5403174?casa_token=s_Cz9rMfNgMAAAAA:W7KEYHZW2BDaa_8iYojV9igI0XmcHc1tmWjm7q1u1b6V8bq_PvmzGTGZ5pA7dZ_n48XEsulM4g
Leave a Reply