Reflection Essay

Dalton Lewis II
Old Dominion University
IDS 493
December 2025

Abstract

This reflection essay examines the interdisciplinary skills, artifacts, and learning experiences that shaped my development as a cybersecurity student focused on defense, monitoring, and detection. Drawing from coursework, internships, hands on labs, and real world work experiences, I demonstrate how my academic journey strengthened my ability to think critically, solve complex problems, and apply cybersecurity concepts across multiple disciplines. By analyzing nine artifacts, three for each major skill area, I show how my learning aligns with career expectations for Security Operations Center roles. Through this reflection, I explore how my coursework, especially Cyber Techniques and Operations, revealed my strengths, clarified my career direction, and reinforced my commitment to blue team operations. This essay also integrates interdisciplinary theories discussed in IDS 300W, including narrative identity, systems thinking, and applied learning, to demonstrate how different forms of knowledge work together to shape professional readiness. Ultimately, this reflection highlights how my degree program prepared me for a future SOC role by enhancing my technical abilities, analytical skills, communication, and professional mindset.

Introduction

An interdisciplinary education requires students to integrate insights, skills, and methods from multiple fields to solve complex problems. As a cybersecurity student, I learned quickly that technical skill alone is not enough. Success in this field depends on analytical reasoning, communication, adaptability, and the ability to draw from diverse forms of knowledge. According to Klein (2017), interdisciplinary thinking expands our capacity to navigate complex systems by seeing connections between fields that traditionally remain separate. This concept reflects my own journey, where coursework, internships, and personal experiences collectively shaped my abilities and clarified my direction within cybersecurity.

Throughout my degree program, I developed three core skills that define both my learning and my career goals. These skills include Security Operations and Threat Detection, Technical and Analytical Problem Solving, and Interdisciplinary Communication and Professional Skills. Each skill is demonstrated through three artifacts, including coursework samples, analytical assignments, and a newly created SOC style Wireshark packet analysis. Together, these artifacts represent how my understanding deepened and how I became prepared for defensive cybersecurity work. The process of creating this ePortfolio also pushed me to examine not only what I learned, but how I learned it, which is a major outcome emphasized in IDS 300W. Looking back at assignments from different semesters allowed me to see patterns in my growth, areas where I struggled, and moments where concepts finally made sense. Those insights are now central to how I imagine myself as a cybersecurity professional.

Skill 1: Security Operations and Threat Detection

Security Operations and Threat Detection is the foundation of blue team work. This skill involves monitoring systems, analyzing potential threats, interpreting security data, and understanding how networks behave under normal and abnormal conditions. Cybersecurity defense work requires being alert, detail oriented, and able to interpret small clues that may point to serious risks. Developing this skill took time, practice, and exposure to different security concepts.

Artifact 1.1 Cyber Techniques and Operations Assignment

One of the most influential artifacts in my academic journey is an assignment from Cyber Techniques and Operations, which has been the most challenging course I have taken. In this course, I learned how attackers exploit vulnerabilities, how commands function on a technical level, and how cybersecurity operations require precision and discipline. Every command mattered because a single misplaced letter or extra space could cause an entire process to fail. This experience taught me patience and showed me how important accuracy is in real world cybersecurity operations. Without understanding how attackers think, it is almost impossible to defend a system properly. This assignment strengthened my understanding of threat behavior, which directly connects to the responsibilities of SOC analysts who must distinguish between normal activity and signs of attack.

Artifact 1.2 Linux Based Cybersecurity Lab

This artifact highlights my experience working in Linux environments, which are commonly used across enterprise and SOC infrastructures. Through hands on labs, I learned how to navigate the terminal, analyze system behavior, and execute commands accurately. Linux initially felt foreign and frustrating, but the more I used it, the more confident I became. This artifact demonstrates growth not only in my technical abilities but also in my mindset toward problem solving. I learned that discomfort often signals an opportunity to grow. In cybersecurity, especially in monitoring and detection roles, analysts must be comfortable using tools that require command line proficiency.

Artifact 1.3 Wireshark Packet Analysis Identifying Suspicious Network Activity

This newly created artifact demonstrates my ability to analyze network traffic using Wireshark. In this analysis, I examined captured packet data to identify abnormal patterns such as repeated outbound connection attempts to a single external IP address. While no confirmed malicious payloads were present, the observed behavior suggested activity that warranted further investigation. Analysts in a SOC must be able to notice these small indicators and recognize when something is out of place. This artifact helped me understand how raw network data is used in investigations and how important it is to think carefully before concluding that something is benign or malicious. It reflects the detective like mindset needed for defensive cybersecurity roles.

Skill 2: Technical and Analytical Problem Solving

Cybersecurity requires both technical knowledge and analytical reasoning. Analysts must evaluate data carefully, troubleshoot issues, and respond to problems pressure. Problem solving is at the center of everything a SOC analyst does. Whether investigating alerts, verifying suspicious login attempts, or identifying misconfigurations, analysts must combine technical abilities with thoughtful reasoning.

Artifact 2.1 Technical Problem Solving Paper

This artifact represents my ability to analyze cybersecurity problems and apply interdisciplinary concepts to propose solutions. Completing this assignment required integrating technical knowledge with ethical and analytical considerations. Many cybersecurity problems do not have one correct answer. Analysts must weigh risks, potential impacts, and operational constraints. Writing this paper helped me practice explaining how I reached conclusions, which is a skill SOC analysts need when documenting incidents or communicating findings to supervisors.

Artifact 2.2 Precision Based Technical Reflection

This reflection focuses on assignments where even the smallest errors caused tasks to fail. The experience taught me patience, discipline, and the importance of accuracy in cybersecurity work. It also taught me to slow down and think before acting. In the fast paced environment of a SOC, rushing can lead to misinterpretation of logs or incorrect assumptions about an alert. This artifact represents the deeper lesson that frustration can become a teacher. Instead of giving up, I learned to use frustration as a sign that I needed to adjust my approach.

Artifact 2.3 Linux Troubleshooting Skills Demonstration

In this artifact, I demonstrate my ability to troubleshoot technical issues within Linux environments. I learned to diagnose errors, adjust commands, and examine logs to resolve problems. Troubleshooting is often overlooked as a skill, but in cybersecurity, it is essential. Analysts must be able to determine whether an issue is a user error, a technical glitch, or a sign of compromise. This artifact shows how hands on experience shaped my ability to analyze issues systematically. It also reflects how technical and analytical skills work together, reinforcing my preparedness for real world SOC work.

Skill 3: Interdisciplinary Communication and Professional Skills

Effective communication is critical in cybersecurity. SOC analysts must write reports, escalate incidents, and explain technical issues clearly. Even the best technical analysis has little value if it cannot be communicated in a way that others can understand. My experiences in school, internships, and professional environments helped me build these communication abilities.

Artifact 3.1 Job Advertisement Investigation Paper

This artifact demonstrates my ability to analyze job advertisements and connect industry expectations to my academic preparation. By examining cybersecurity job postings, I identified key technical and professional skills needed for SOC roles. This assignment helped me understand what employers look for and how my coursework aligns with real world expectations. It also encouraged me to think critically about my strengths and areas that still need improvement.

Artifact 3.2 Personal Narrative Essay

My personal narrative essay explores how my academic path, internships, and personal experiences shaped my identity and career goals. Drawing on narrative identity theory, this artifact demonstrates my ability to reflect, synthesize theory, and communicate meaningfully. These abilities are directly applicable to professional cybersecurity environments, where analysts must articulate investigations, justify decisions, and document findings clearly. Writing this narrative also helped me understand how my past experiences prepared me for cybersecurity, even experiences that did not seem related at first.

Artifact 3.3 Internship and Professional Experience Summary

This artifact highlights my internship experiences with MESAA and the Defense Logistics Agency, where I developed communication, teamwork, and professionalism. At MESAA, I created cybersecurity materials for high school students, which required me to simplify complex concepts. At DLA, I learned how to collaborate with supervisors and support operational tasks. These experiences showed me that communication is not just about writing. It is about adapting to your audience and making sure the message is clear.

Interdisciplinary Learning and Degree Outcomes

My interdisciplinary education played a crucial role in my development. Courses such as IDS 300W encouraged reflection, critical thinking, and integration of knowledge across disciplines. Cybersecurity itself blends computer science, ethics, psychology, writing, and organizational behavior. When investigating an incident, analysts must understand human behavior, technical systems, and communication practices. Seeing cybersecurity through an interdisciplinary lens helped me appreciate how different forms of knowledge intersect. It also prepared me to work in environments where cross departmental collaboration is essential.

Career Readiness and Future Goals

Through my coursework and artifacts, I gained confidence in my ability to pursue a SOC role focused on monitoring, detection, and defense. I learned that my strengths align more with blue team work rather than offensive hacking. I also realized that career readiness is not only about technical skill. It is about being adaptable, willing to learn, and open to feedback. As I move forward, I plan to strengthen my defensive skills even further, explore new tools used in modern SOC environments, and pursue certifications that support my long term goals.

Conclusion

This portfolio reflects my academic growth, interdisciplinary learning, and readiness for a cybersecurity career. Each artifact represents a step toward understanding my role in cybersecurity defense. Through technical challenges, reflective writing, and professional experience, I developed skills that prepare me for SOC work. My degree program strengthened my ability to integrate knowledge, think critically, and communicate effectively. These abilities form the foundation for my future in cybersecurity, where monitoring, detection, and problem solving come together to protect systems and support mission driven work.

References

Klein, J. T. (2017). Interdisciplining digital humanities Boundary work in an emerging field. University of Michigan Press.
McAdams, D. P. (1993). The stories we live by Personal myths and the making of the self. Guilford Press.
Nguyen, C. T. (2019). The art of self construction. Oxford University Press.
Repko, A. F., and Szostak, R. (2021). Interdisciplinary research Process and theory fourth edition. SAGE Publications.
Smith, J. A. (2011). Evaluating the contribution of interpretative phenomenological analysis. Health Psychology Review, 5(1), 9 to 27.