Introduction
The Cybersecurity industry has various career roles designed to protect digital systems
and networks. As cyber attacks have become more frequent, the role of a cybersecurity analyst is
increasingly vital in protecting systems and networks. Cybersecurity analyst, a role involved in
monitoring networks, maintaining software, checking for security vulnerabilities, and developing
security standards. The purpose of this paper is to analyze how cybersecurity analysts apply
social science research and principles to their daily professional routine, focusing on key
concepts such as Objectivity and Ethical Neutrality, Human Factors, and Cyberpsychology.
Social Science Principles
Social science principles are a significant aspect of a cybersecurity analyst’s career, as
they help them understand and recognize human factors in cyberspace. Analysts regularly apply
behavioral analysis to understand hacking motivations, such as financial gain or thrill-seeking, as
well as ethical issues, such as balancing surveillance with privacy rights, relating to ethical
Neutrality. Understanding cognitive biases from behavioral economics helps analysts understand
and predict why employees might bypass protocols or abandon them entirely.
Analysts utilize social science principles, such as Objectivity, to make objective decisions
based on facts and evidence rather than opinions. Objectivity is central to the role of a
cybersecurity analyst, as it requires objectively analyzing incidents, auditing systems, monitoring
networks, and responding to attacks. The incorporation of Objectivity improves cybersecurity
professionals’ ability to validate information by using established methods and standards to
verify its accuracy and reliability before accepting it as factual. (Gauth, 2025).
Application of Key Concepts
Concepts from modules 2 and 4 relate to the daily duties of a cybersecurity analyst and to
the principles of social sciences and cybersecurity (module 2: Objectivity and Ethical
Neutrality). Objectivity is essential to this profession because it enables fact-based decisions in
creating adequate security measures. Ethical Neutrality aligns with Objectivity because it focuses
on fairness and impartiality to uphold security and privacy standards.
In Module 4, the field of cybersecurity is directly affected by human factors, given the
role of a cybersecurity analyst and the effects humans have on security. Cyberpsychology also
relates to this profession, understanding how the technology created affects users’ thinking and
decision-making to develop security that is adaptable to humans. “Applying the science of
psychology to cybersecurity helps cybersecurity professionals understand where, how, and why
they are falling short in building a security program that works, experts say. We need to design
security with people in mind because if security does not work for people, it just does not work.”
(Pratt, 2023).
Marginalization
Cybersecurity analysts have an impact on marginalized groups, often experiencing cyber
attacks due to a lack of digital literacy, systemic inequities, affordability, and discriminatory
practices. Analysts are in place to confront attacks by incorporating social science principles.
Low-income and minority communities face sorts of vulnerabilities; for example, people who
lack digital literacy are more likely to fall for phishing attacks.
Professionals addressed these issues by partnering with organizations that work with
companies to implement “protective features for high-risk users, strengthen safety measures,
improve content moderation, invest in other languages, and enforce policies against
disinformation and deepfakes”. (Aljizawi et al., 2024).
Career Connection to Society
Cybersecurity analysts contribute to society by protecting critical infrastructure, such as
healthcare records, ensuring digital safety and privacy, safeguarding financial systems, and
protecting the economy from disruptions, as well as growing the economy through high demand
and well-paid opportunities. (Halladay, 2021).
Scholarly Journal Articles
The article explains social cybersecurity as a computational social science discipline,
stating that tools such as network analysis, data science, machine learning, natural language
processing, and agent-based simulation are employed to provide evidence on who is
manipulating social media. Key findings reveal how online platforms enable large-scale
cybercrime, with immediate applications for analysts in predicting influence campaigns. (Carley,
2020), directly tying it to class concepts such as Culture, Social Media, and Cybersecurity.
The study supports the idea that including psychology in workforce development,
technical skills, and social metrics can improve performance more than technical skills alone.
(Dawson & Thomson, 2018) It supports the analysis of social science principles by highlighting
the user’s role in defense.
This article highlights the role of cybersecurity analysts as more than just technical
experts, but as security for society, as marginalized groups face digital attacks. Analysts work to
protect by detecting threats and safeguarding against internet dangers. Safeguarding sensitive
information, mitigating risks and cybersecurity issues, preserving privacy, and maintaining the
integrity of critical systems and infrastructure are ways in which cybersecurity professionals
impact society. (Malone, 2025)
Conclusion
In conclusion, a cybersecurity analyst’s career involves applying social science principles
and technical skills to perform their duties. Applying class concepts such as Objectivity and
Ethical Neutrality, transform the methods used to confront vulnerabilities and threats.
References
(2025, August 28). Information Security Analysts. U.S BUREAU OF LABOR STATISTICS.
Retrieved November 14, 2025, from
https://www.bls.gov/ooh/computer-and-information-technology/information-security-anal
ysts.htm
Sachs, D. (2023, June 6). The Tricky Mind Games of Cognitive Biases in Information Security.
Https://www.Cybersecuritytribe.com/. Retrieved November 14, 2025, from
https://www.cybersecuritytribe.com/articles/the-tricky-mind-games-of-cognitive-biases-i
n-information-security
Team, L. L. (2025, February 4). A Day in the Life of a Cyber Security Analyst.
Https://Lumifylearn.com/. Retrieved November 14, 2025, from
https://lumifylearn.com/blog/blog-a-day-in-the-life-of-a-cyber-security-analyst/#:~:text=
Morning,wrapping%20up%20for%20the%20day, wrapping up for the day,
Pratt, M. K. (2023, June 3). Why cyberpsychology is such an important part of effective
cybersecurity. Https://www.Csoonline.com/. Retrieved November 14, 2025, from
https://www.csoonline.com/article/643967/why-cyberpsychology-is-such-an-important-p
art-of-effective-cybersecurity.html
(2025, April 26). Why Are Marginalized Groups Most Affected by the Digital Divide?
Https://Climate.Sustainability-Directory.com/. Retrieved November 14, 2025, from
https://climate.sustainability-directory.com/question/why-are-marginalized-groups-most-
affected-by-digital-divide/
Aljizawi, N., Lawford, N., & Bocu, G. (2024, September 30). Enhancing cybersecurity resilience
for transnational dissidents. CLTC.
https://cltc.berkeley.edu/publication/cyber-resilience-for-transnational-dissidents/#:~:text
=They%20also%20recommend%20that%20technology,security%20and%20advocacy%2
0for%20freedom.%E2%80%9D
Dawson, J., & Thomson, R. (2018, June 11). The Future Cybersecurity Workforce: Going
Beyond Technical Skills for Successful Cyber Performance. Frontiers in Psychology.
Retrieved November 14, 2025, from
https://www.frontiersin.org/journals/psychology/articles/10.3389/fpsyg.2018.00744/full
Malone, B. (2025). The Growing Importance of a Career in Cyber Security. Colorado Christian
University. Retrieved November 14, 2025, from
https://www.ccu.edu/blogs/cags/category/business/the-growing-importance-of-a-career-in
-cyber-security/
Halladay, K. (2021, November 17). What is an Information Security Analyst? What Do They Do?
Https://Builtin.com/. https://builtin.com/articles/information-security-analyst
https://www.gauthmath.com/solution/1831312691765265/How-does-objectivity-enhance-critical-
thinking-for-cybersecurity-professionals-I