Reflective Essay: Demonstrating Career Readiness through Interdisciplinary Learning
As I look back on my academic journey in the cybersecurity program at Old Dominion University, I realize just how much I’ve grown—not only in my technical abilities, but also in how I think, communicate, and solve problems. This program hasn’t just taught me how to use firewalls or monitor traffic logs; it’s taught me how to think critically, write clearly, and adapt to new challenges. What made this experience so valuable is the interdisciplinary nature of the program. Along the way, I took courses that touched on law, ethics, communication, and technology. These different perspectives helped shape me into someone who doesn’t just understand cybersecurity from a technical point of view but also sees its legal, social, and ethical impacts.
Throughout the program, three skills became central to my development: cybersecurity strategy and monitoring, technical writing and documentation, and professional communication and teamwork. Each of these skills is reflected in the artifacts I’ve included in my portfolio, and each one tells a story of how I learned to connect theory to real-world practice. In this essay, I’ll walk through each skill, share the lessons behind the artifacts, and explain how they’ve helped prepare me for a career in cybersecurity.
Cybersecurity Strategy & Monitoring
One of the most valuable skills I developed is being able to assess and implement cybersecurity strategies. I didn’t fully appreciate how complex this skill was until I started volunteering with the National Association of Certified Child Forensic Interviewers (NACCFI). Over the past few years, I’ve helped them monitor their website for unusual activity, track potential security concerns, and flag risks before they became problems. What started as a basic role quickly grew into something more involved—I was reading server logs, setting up access controls, and even writing up informal reports on what I found.
The Web Monitoring Log artifact in my portfolio is a simulation of this work. While the entries are fictional, they reflect real types of issues I helped NACCFI handle. This experience connected directly with what I learned in my cybersecurity strategy and network defense classes. I could finally see how concepts like the NIST Cybersecurity Framework applied in an actual organization, and I understood how to use tools like monitoring logs and user authentication settings in meaningful ways.
But the learning didn’t stop at just the tech. My classes in ethics and law gave me a broader view. For example, when I monitored for login attempts or flagged suspicious activity, I also had to think about privacy rights and transparency. Those were topics we discussed in courses like Cyber Law and IDS 300W, and they shaped the way I approached my work. I didn’t want to just monitor a site—I wanted to do it responsibly.
Technical Writing & Documentation
Before this program, I never imagined how important writing would be in a tech career. I used to think cybersecurity was mostly about coding, configuring systems, and fighting off hackers. But the more I got into the field, the more I realized how essential it is to document what you’re doing—and to explain it in a way that other people can understand. Whether you’re creating a user policy, writing a report after an incident, or putting together training materials, being able to write clearly and professionally is key.
That’s where the NACCFI Handbook Excerpt and the Cyber Law Memorandum in my portfolio come in. These two documents represent very different types of writing, but they both show how I’ve developed my skills in technical documentation.
The handbook excerpt is something I contributed to during my work with NACCFI. It focuses on best practices for child forensic interviewing, and I helped reword and reorganize parts of the manual to make them more user-friendly. Even though the content wasn’t always directly about cybersecurity, the experience taught me how to structure professional documents and tailor my language for the right audience—skills that definitely carry over to cybersecurity documentation.
The memorandum, on the other hand, was a class assignment where I wrote to a fictional governor about data privacy laws. It pushed me to combine legal research, ethical analysis, and policy recommendations into a concise, professional memo. Writing it made me realize how cybersecurity isn’t just a technical field—it’s a social issue, too. I had to think about how laws like GDPR could be adapted at the state level and what kind of impact that would have on people, businesses, and government agencies. It was one of the first times I truly saw myself applying what I’d learned in a real-world context.
Professional Communication & Team Collaboration
If there’s one thing I’ve learned from both class projects and real-world experiences, it’s that cybersecurity is not a solo sport. You’re constantly working with others—whether it’s other tech professionals, non-technical colleagues, or clients who rely on you to keep their systems secure. Being able to communicate clearly, listen, and collaborate has become one of the most important skills I’ve developed, and it’s something I’ve had to practice in multiple settings.
The Cybersecurity Awareness Campaign presentation is a great example. For this group project, we created a campus-wide campaign to educate students on things like phishing, strong passwords, and safe browsing. I worked with a team where everyone had different strengths—some were better at design, some at research, and some (like me) at organizing the big picture. We had to coordinate across multiple tasks, give each other feedback, and present our findings clearly. It was like a crash course in real-world teamwork.
The Email Exchange artifact also reflects this skill. It’s a simulated conversation based on the kinds of messages I’ve had to write while volunteering. It shows how I’d professionally report a potential security incident, offer next steps, and respond to feedback. Even though it’s just a sample, it represents the way I’ve learned to handle communication in a cybersecurity setting—direct, responsible, and respectful.
Looking back on my coursework, experiences, and the artifacts I’ve built, I can confidently say that this program has prepared me for a career in cybersecurity, not just technically, but professionally and personally. What made the difference wasn’t just learning how to set up a firewall or write a security policy. It was the interdisciplinary approach, bringing together ideas from computer science, law, communication, and ethics, that helped me think more critically and act more responsibly.
Courses like IDS 300W taught me how to see problems from multiple angles, and that’s a skill I’ve used in almost every project since. Being an interdisciplinary thinker means I’m not just solving problems; I’m asking better questions, thinking about the human impact of my work, and finding smarter, more inclusive solutions. In a field that’s constantly evolving, that kind of mindset is not just helpful, it’s essential.
I’m excited to move forward in my career knowing that I have both the technical foundation and the well-rounded thinking that this program helped me build. And I know that wherever I go next, these skills, developed through classroom learning, hands-on work, and cross-disciplinary thinking, will continue to guide me.