Career paper

Combining Tech with Social Sciences as a Cybersecurity Analyst

Introduction

                The value of Cybersecurity Analyst increases the more often people use technology as an extension of their everyday lives. Understanding the human elements when working as a cyber security analyst will severely upscale their efficiency with understanding vulnerabilities that humans bring in cyber space. Since so many attacks are based around social engineering ideas, it helps the analyst with the decision making process on how to move forward. With the understanding of how many different social groups use the internet, it can be an extra tool that they can use with the decision making process.

How this relates to social sciences

                Social engineering attacks can range from baiting, phishing, spear fishing, etc. From using a honeypot for example, cyber security analysts can use this to gather information on what to look for when these attackers attempt to steal information. When an analyst uses their threat detection tools such as Qradar or Wireshark, they can identify suspicious emails or activity easily, preventing a breach in the security.  From using a white hat ethical framework, it helps what to prioritize whether its security for the company or user privacy.

Training and threat awareness

                While Cyber security analysts are expected to implement training to keep their metrics up, its expected that they keep their employees up to date on new attacks and their policies to maintain a save environment. They could use a simulated attack for phishing or ransomware to see the awareness levels of the employees and see which would need remedial training. While understanding the diversity is huge for a cyber analyst, they need to curtail the training for specific roles, so they understand what’s expected of them. For threat detection, analyst’s are expected to study trends online to stay proactive when protecting the companies security layer. They can also remain proactive on holidays just to hold extra layers of security to protect the breach.

Conclusion

                In conclusion, there are several different social aspects that go into being a cyber security analyst. By using Maslow’s hierarchy of needs cyber security analysts can really use the safety needs a good point to follow on their decision making processes. By changing training to individual roles within an organization, it will benefit the company at all levels and show what they need to improve on as an instructor. By using several different methods to analyze data and help alleviate threats that come in the network, it shows the importance of the cyber security analyst and how fast the field grows.

Leave a Reply

Your email address will not be published. Required fields are marked *