Cybersecurity Professional Career Paper

Cybersecurity Professional Career Paper: Cybersecurity Analyst Career

Introduction

What is so important about cybersecurity? Cybersecurity analysts are one of the most critical people working to protect companies, governments and individuals from cyber threats. Not only do they look at your network for issues (vulnerabilities) and help fix them, but they must also act quickly if a glitch comes up with an attempt to gain access to your computer system or network. That’s because, while we can think of cybersecurity as mainly involving computers and technology, human psychology, the study of all things human and how we act, think and socialize are a big part of the job of cybersecurity. Indeed, much of the cyberattack takes place not just by taking advantage of the technology themselves, but by deceiving people to gain access to computer systems and/or access information. For this reason, researchers in psychology, sociology and other disciplines in behavioral science give analysts the research they need to understand what drives cybercrime and how to stop it. What’s more, the social sciences have helped analysts discover patterns of behavior; understand why one commits cybercrime; and build security measures to protect both individual users and businesses.

Responsibilities and Role of a Cybersecurity Analyst

Cybersecurity analysts employ security technologies to identify instances of anomaly and act on them — assess if an incident has taken place, define measures to mitigate the risk of a recurrence in the future. Cybersecurity analysts may also perform vulnerability assessments, formulate security policies and produce educational materials for employees on best practices when it comes to cybersecurity.

The cybersecurity analyst plays an important role in the understanding of the human factor in cybersecurity. Cyberattacks in many cases take place via social engineering, phishing, and user manipulation through the use of human behavior. So it is very crucial to know how individuals respond to such types of attacks, and why various humans react differently to these attacks. Social science research enables cybersecurity analysts to ascertain why individuals are attacked by these same types of attacks and assist them to devise more effective measures to protect users against these types of attacks. For example, social science researchers have built theories concerning risk perception, decision-making and cognitive bias in order to explain which leads people to ignore alerts from warnings or click on links as if they are being made under harmful conditions at all. With this knowledge, cybersecurity people in the process of designing training programs and mechanisms for security will help in reducing the probability of users from making mistakes—and by doing so put them at risk of falling into cyber traps.

Utilizing Social Science Principles

The social science concepts are inherent in cybersecurity. A considerable part of cybercrime is determined by human behavior. Understanding this phenomenon is provided by theories of criminology, psychology, and sociology, which help to explain some of why people indulge in cybercrime and the way organizations can help prevent others from doing so as well. One of the concepts particularly salient is routine activity theory, which says that a motivated offender encounters a suitable target and that target is unprotected, and the criminal has to take advantage of it to succeed. Cybersecurity analysts put this theory to use in practice by increasing a company’s defenses, identifying and eliminating vulnerabilities and adding more systems that can detect an attacker. And then there is the human-centered model of cybersecurity. Human-centered cybersecurity stresses that we have to build security practices and systems to be in sync with how people actually act. Instead of assuming that people will always operate perfectly to avoid exposing themselves to cyber risks, analysts discover that we humans make errors. By being less obfuscated and more intuitive, organizations can develop systems that drive secure behavior.

Empirical Research

Cybersecurity analysts also use empirical research to understand cyber risks. Empirical research means collecting data on cybersecurity threats and analyzing them. Research should be conducted for systematic purposes. Cybersecurity analysts collect data from incident reports, threat intelligence and behavior data to identify patterns of behavior and recognize common characteristics of cyber dangers. This data helps organizations make better decisions when creating either specific cyber policies and defense measures against the next cybersecurity threats that are the focus of the cybersecurity analysts.

Effect on Vulnerable Populations and Society

Cybersecurity practitioners must also focus on the effects of cyber threats in particular on the most vulnerable segments of society. For some groups, there will also be a greater threat risk from cyber-scams, because of limited access to technology programs, limited financial resources, and/or lack of literacy surrounding cybersecurity; for example, older adults, lower-income groups, and people with low digital literacy tend to be targets of online scams or fraud.

Cybersecurity analysts need to work with these populations to build systems and applications that bring accessibility and usability. Such examples include media campaigns, security training, and a simplified security system interface. Cybersecurity analysts should also consider that the kinds of security technologies might lead to the exclusion and/or marginalization of these populations unintentionally. Ethical cybersecurity demands an analysis of fairness, accessibility, and other social repercussions of the analyst’s actions.

Cybersecurity analysts are also contributing to national security, economic stability for a larger extent, which is the economy and people getting faith in digital systems more generally. The penetration of technology is growing faster than this and as technology becomes more ingrained into the fabric of our lives, so are cybersecurity professionals’ requirements that we maintain and protect our digital infrastructure and keep it safe and dependable.

Conclusion

It is important to identify if a cybersecurity analyst must have the necessary technical skills, but these are not the only skills needed. Social science content knowledge is also critical to achieve cybersecurity analyst success. By understanding why people make decisions, how they interplay with each other and with technology as well as why some behave in ways that are likely criminal when it comes to cybercrime, security analysts in the field can better predict and contain threats. Analyzing social science research provides precious details about cybercrime research to understand why cybercrime occurs and how people engage with technology. Data in these analyses can inform analysts how to build tighter security mechanisms, training programs, and policies. In addition to addressing this type of concern within their professional work, cybersecurity professionals must also include consideration of greater social impacts, on the larger human context of cyber threat on vulnerable people and the entire community. With technology constantly advancing, the integration of social science alongside cybersecurity will also remain crucial and indispensable to protect men, women, institutions, and citizens from the internet.

References

Anderson, R. (2020). Security engineering: A guide to building dependable distributed systems (3rd ed.). Wiley.

Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13–21.

National Institute of Standards and Technology. (2023). Cybersecurity workforce framework (NICE Framework). https://www.nist.gov