Social Behaviors and Cybersecurity Analysis

In analyzing the role of Cybersecurity Analyst within the video, there were many social
themes that I noticed throughout. They really highlighted how this technical role actually
involves a lot of knowledge in human factors and social dynamics. What really struck me first in
the video was how the presenter described cybersecurity analysts as being people-focused
professionals. The role involves providing a lot of guidance and training for users where they are
essentially educating people in understanding these technical concepts. This kind of role would
require a lot of people skills and being aware of different cultures in order to reach people in the
best way for the most technical literacy to be gained. In focusing on keeping users aware
through training, it revealed how much cybersecurity analysts would need to understand
psychology and behavior to identify why people fall for these attacks and do not follow the
protocol. In this role, you are not just monitoring the network, but studying human behavior and
establishing training to change this behavior.
The presenter also gave great advice on how they were able to gain more experience
through community involvement. This can be done through churches, non-profits, volunteering,
etc. It really highlighted how cybersecurity work can be connected to the community and being
socially responsible. By suggesting to get involved with these non-profits, the presenter showed
how cybersecurity professionals can be protectors of the community and use their skills for the
betterment of the community. This community focused approach also showed how these
technical skills can be valuable in society and be exchanged for experience and career
advancement. Even though the presenters said they do not like networking, it was still important
to acknowledge how important it is within cybersecurity careers. It really showed the connection
on how professionals that are protecting against social engineering attacks should also be good
at social engineering. The discussion of salary in the video also showed how cybersecurity is a
great career for economic goals. The presenters showed that this is a career that is high paying
and can serve as a mechanism to reduce economic inequality. There is however the downside
that can be brought up that they place such emphasis on graveyard shifts and assume that
these entry-level workers do not have a family, so they are able to work these shifts.
The video also went into how the responsibilities of the position could really change from
company to company depending on the culture and social dynamics of the organization. This
means that analysts would have to be adaptable to different workplace cultures. With these
different cultures, you would also have to adopt different communication styles. You would also
have to prioritize different things in the organization in order to fulfill the company’s mission. This
can really be the case for working at most companies, but in applying it to the cybersecurity
analyst, it prepares you for the need to be an adaptive career that is ahead of you.
In reflecting on this video, I think that it painted a great picture on the cybersecurity
analyst position and what it means to work in this field. It is a field that relies upon social factors
just as much as technological factors. It is also a position that is more effective in how much you

are able to understand human behavior, build relationships, and communicate through different
cultures and educational experiences. This kind of view on cybersecurity analysis really
challenges the current view of cybersecurity being antisocial and purely technical. In actuality, it
is a field that shows analysts as protectors of the community and requires a lot of understanding
in social dynamics and psychology. By serving as a bridge between technology and
communities, it makes the field of social science essential in bettering the community through
any kind of emerging technology or cyber threat.

Leave a Reply

Your email address will not be published. Required fields are marked *