Introduction
The value of Cybersecurity Analyst increases the more often people use
technology as an extension of their everyday lives. Understanding the human elements
when working as a cyber security analyst will severely upscale their efficiency with
understanding vulnerabilities that humans bring in cyber space. Since so many attacks
are based around social engineering ideas, it helps the analyst with the decision making
process on how to move forward. With the understanding of how many different social
groups use the internet, it can be an extra tool that they can use with the decision
making process.
How this relates to social sciences
Social engineering attacks can range from baiting, phishing, spear fishing, etc.
From using a honeypot for example, cyber security analysts can use this to gather
information on what to look for when these attackers attempt to steal information. When
an analyst uses their threat detection tools such as Qradar or Wireshark, they can
identify suspicious emails or activity easily, preventing a breach in the security. From
using a white hat ethical framework, it helps what to prioritize whether its security for the
company or user privacy.
Training and threat awareness
While Cyber security analysts are expected to implement training to keep their
metrics up, its expected that they keep their employees up to date on new attacks and
their policies to maintain a save environment. They could use a simulated attack for
phishing or ransomware to see the awareness levels of the employees and see which
would need remedial training. While understanding the diversity is huge for a cyber
analyst, they need to curtail the training for specific roles, so they understand what’s
expected of them. For threat detection, analyst’s are expected to study trends online to
stay proactive when protecting the companies security layer. They can also remain
proactive on holidays just to hold extra layers of security to protect the breach.
Conclusion
In conclusion, there are several different social aspects that go into being a cyber
security analyst. By using Maslow’s hierarchy of needs cyber security analysts can
really use the safety needs a good point to follow on their decision making processes.
By changing training to individual roles within an organization, it will benefit the
company at all levels and show what they need to improve on as an instructor. By using
several different methods to analyze data and help alleviate threats that come in the
network, it shows the importance of the cyber security analyst and how fast the field
grows.