{"id":333,"date":"2024-04-08T01:19:08","date_gmt":"2024-04-08T01:19:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/etano001\/?p=333"},"modified":"2024-04-08T01:19:08","modified_gmt":"2024-04-08T01:19:08","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/etano001\/2024\/04\/08\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Emmanuel Tanoh<br>04\/02\/2024<br>Diwakar Yalpi<\/p>\n\n\n\n<p><br><strong>Blue Teamer (Cyber Defence Analyst)<\/strong><br>A Blue Teamer Cyber Defense Analyst is a cybersecurity professional who excels at<br>strengthening an organization&#8217;s digital defenses against cyber threats. They work in the security<br>operations center (SOC) or incident response team, specializing in defensive tactics and<br>emphasizing preventative measures to protect networks, systems, and sensitive data. Their ability<br>to quickly identify and address possible security incidents is largely dependent on their<br>continuous monitoring and analysis of security alerts produced by different tools, such as SIEMs<br>and intrusion detection systems. These analysts work closely with other teams to resume regular<br>operations. They are adept at looking into alerts, determining their seriousness, and<br>implementing containment and remediation plans as necessary. Overall, Blue Teamer Cyber<br>Defense Analysts oversee and improve security tools in addition to responding to incidents.<\/p>\n\n\n\n<p><br><strong>Why is the role Important?<\/strong><br>In small to mid-sized businesses with limited resources, the all-around defender role<br>becomes a crucial cybersecurity cornerstone. Those who occupy this role, despite not having a<br>title, perform a variety of tasks connected to various aspects of defense. Furthermore, &#8220;An<br>approach is to continuously and protectively monitor the organization&#8217;s ICT and applications,<br>and to ensure there is an incident response plan in the event of a security breach, compromise, or<br>policy violation.&#8221;(Onwubiko 2015, p.1) .This is how an organization can safeguard its vital<br><br>services, networks, systems, and infrastructure. These flexible professionals manage everything<br>from handling security tools and alert monitoring to integrating threat intelligence and handling<br>incidents as the organization&#8217;s first line of defense against cyber threats. Complete protection of<br>digital assets is ensured by their multifaceted approach, even in the face of resource limitations,<br>emphasizing the critical need for flexible cybersecurity professionals who can play a variety of<br>roles in ever-changing operational environments.<br><\/p>\n\n\n\n<p><strong>How Social Science ties into C.D.A<\/strong><br>In order to handle the human-centric aspects of cybersecurity, cyber defense analysts<br>frequently draw on social science research and principles in their work. \u201cToward such an<br>understanding, we discuss the results of a cognitive task analysis (CTA) which sought to<br>determine the goals and abstracted elements of awareness that cyber analysts seek in<br>network defense \u201c(Gutzwiller et al 2016, p.7). Analysts can create security measures that are<br>both user-centric and highly protective by taking into account the needs and preferences of the<br>user. Furthermore, the application of cybersecurity measures in organizational contexts is<br>facilitated by the knowledge that organizational psychology and sociology provide analysts about<br>organizational dynamics, culture, and change management principles. In order to make sure that<br>security procedures are in line with societal values and individual rights, analysts must also<br>carefully consider ethical criteria and legal requirements. In addition, social science based<br>research on risk perception and communication improves analysts&#8217; capacity to inform<br>stakeholders about cybersecurity risks and help to develop risk mitigation plans. All things<br>considered, the incorporation of social science viewpoints into cybersecurity procedures provides<br><br>analysts with important instruments and perspectives to tackle the human aspects of<br>cybersecurity, thereby fortifying defenses against cyberattacks.<br><\/p>\n\n\n\n<p><strong>Key Concepts Applied<\/strong><br>The CYSE201S course&#8217;s modules 5 and 8 provide a multifaceted understanding of cyber<br>offenses, victimization, and the roles of cybersecurity professionals by intricately integrating<br>psychological and sociological principles into the field of cybersecurity. These modules explore<br>psychological theories that account for these behaviors while emphasizing the significance of<br>identifying the personal motivations behind cybercrimes, such as amusement, political activism,<br>retaliation, and financial gain. They also emphasize the psychological effects on victims and the<br>qualities that cybersecurity experts possess that help them be successful in their jobs. Cyber<br>defense analysts can improve threat assessment, create focused training initiatives, use<br>behavioral analysis for predictive security, assist in their team members&#8217; mental health, and hone<br>their soft skills for all-encompassing cyber defense plans by incorporating these insights. This<br>all-encompassing strategy does not only strengthens technological defenses but also promotes a<br>better comprehension of the human aspects involved in cybersecurity.<br><\/p>\n\n\n\n<p><strong>Marginalized groups and society<\/strong><br>Cyber defense analysts play a critical role at the intersection of cybersecurity and society,<br>with serious consequences for marginalized groups. They negotiate intricate dynamics, such as<br>unequal access to technology and structural injustices, that affect the security environment.<br>Analysts must make sure security measures are inclusive and accessible, taking into account the<br>needs of marginalized communities, while also acknowledging the existence of the digital divide.<br>They also deal with privacy and surveillance concerns, protecting against violations that<br>disproportionately impact marginalized communities. Because these types of groups are<br>frequently the main targets of cybercrime, analysts must be diligent in their detection and<br>response efforts to reduce risks like identity theft and online harassment. Analysts who support<br>equity in cybersecurity education and employment seek to remove obstacles that<br>underrepresented groups must overcome in order to enter and grow in the field, creating a more<br>diverse workforce. According to an author by the name of Cavelty, they had even claimed \u201dWhat<br>becomes exceedingly clear from the developments and lessons of the last decade is that we<br>cannot have both: a strategically exploitable cyberspace full of vulnerabilities\u2014and a secure<br>cyberspace that all the cyber-security policies call for.\u201d (Dunn, 2014). Cyber defense analysts<br>help create a more resilient and just digital society by tackling these issues and defending<br>everyone&#8217;s security and dignity, regardless of their identity or background.<br><\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>In conclusion, with an emphasis on proactive defense measures and cooperative incident<br>response, the position of a Blue Teamer Cyber Defense Analyst is critical to protecting<br>enterprises against cyber threats. When faced with limited resources, the all-around defender<br>becomes an essential cybersecurity pillar, handling a wide range of duties related to different<br>aspects of defense. Cyber defense analysts improve their comprehension of human behavior,<br>organizational dynamics, and ethical considerations by drawing on social science research and<br>principles. This strengthens their capacity to create inclusive and efficient security measures. By<br>providing insightful understanding of the psychological and sociological elements of<br><br>cybercrimes, modules like CYSE201S enable analysts to enhance threat assessment and team<br>dynamics. Through tackling the human-centered elements of cybersecurity, analysts strengthen<br>technological barriers while also making a positive impact on building a digital society that is<br>more resilient. At the nexus of cybersecurity and society, cyber defense analysts contribute<br>significantly to the advancement of security and dignity for every person, irrespective of their<br>identity or background.<\/p>\n\n\n\n<p><strong>Reference:<\/strong><\/p>\n\n\n\n<p>Dunn Cavelty, Myriam. &#8220;Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.&#8221; Science and engineering ethics 20 (2014): 701-715.<\/p>\n\n\n\n<p>Gutzwiller, Robert S., Sarah M. Hunt, and Douglas S. Lange. &#8220;A task analysis toward characterizing cyber-cognitive situation awareness (CCSA) in cyber defense analysts.&#8221; 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA). IEEE, 2016.<\/p>\n\n\n\n<p>Onwubiko, Cyril. &#8220;Cyber security operations centre: Security monitoring for protecting business and supporting cyber defense strategy.&#8221; 2015 international conference on cyber situational awareness, data analytics and assessment (cybersa). IEEE, 2015.<\/p>\n\n\n\n<p>20 coolest careers in Cybersecurity. 20 Coolest Cyber Security Careers | SANS Institute. (n.d.). https:\/\/www.sans.org\/cybersecurity-careers\/20-coolest-cyber-security-careers\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Emmanuel Tanoh04\/02\/2024Diwakar Yalpi Blue Teamer (Cyber Defence Analyst)A Blue Teamer Cyber Defense Analyst is a cybersecurity professional who excels atstrengthening an organization&#8217;s digital defenses against cyber threats. They work in the securityoperations center (SOC) or incident response team, specializing in defensive tactics andemphasizing preventative measures to protect networks, systems, and sensitive data. Their abilityto quickly&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/etano001\/2024\/04\/08\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":26173,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/posts\/333"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/users\/26173"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/posts\/333\/revisions"}],"predecessor-version":[{"id":334,"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/posts\/333\/revisions\/334"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/media?parent=333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/categories?post=333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/etano001\/wp-json\/wp\/v2\/tags?post=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}