Narrative

Keeno Montalban
4/1/2025
Writing Assignment #2
Personal Narrative Essay
Introduction
When I was much younger, I was fascinated by technology. However, it wasn’t until my
academic and professional experiences that I have found my passion for cybersecurity. My entire
journey has been shaped by some important moments in my life such as, exposure to ethical
hacking, coursework that has connected social science, and technology, and hands-on
experiences in security analysis. These moments not only influenced my decisions but also
helped me understand the interdisciplinary nature of cybersecurity.
Early Influences and The Academic Foundations
Growing up, I was always fascinated by how computers work. I can’t count how many
I’ve spent exploring software, troubleshooting technical issues, and reading about different types
of cyberthreats. However, my academic journey truly began when I officially enrolled at Old
Dominion University (ODU). All my coursework in computer science gave an insight to
fundamental programming and network security concepts, but it my exposure to interdisciplinary
studies that gave me a deeper understanding of cybersecurity’s societal impact.
Some course I’ve taken in particular have incorporated social science principles such as
criminology, psychology, and ethics that have helped me see cybersecurity way beyond coding
and firewalls. For example, Mcadams’ (2001) theory of narrative identity, which has put an
emphasis on the role of personal experiences in shaping one’s identity, has resonated with me as
I reflected on all my past motivations. Understanding human behavior have become as important
as understanding technical skills, especially within areas like threat intelligence and social
engineering.
The article reviews in my ePortfolio further strengthens the importance of
interdisciplinary connections. For example, in one of my reviews, I went over how insider threats
in organizations are sometimes linked to behavior patterns influenced by workplace culture. This
perspective helped broadened my perspective to cybersecurity, making me more aware of the
human factors that contribute to security breaches.
Also, some of my coursework in digital forensics has introduced me to the more the
technical and legal aspects of cyber investigations. I was drawn to the way forensic analysts
reconstructing cybercrimes by piecing together any digital evidence. This part of the coursework
emphasizes the importance of ethical considerations and legal frameworks, thus further shaping
my understanding of cybersecurity’s much broader implications. The realization of cyber
investigations requires both technical and the ethical responsibility that’s being reinforced by my
commitment to the field.
Moments in Academic Journey: Ethical Hacking and Threat Intelligence
One of the more important experiences in my journey was my first ethical hacking
course. At first, I was intimidated by the complexity of penetration testing tools and
methodologies. However, as dove right straight into real-world case studies, I became more
fascinated by the strategic thinking involved within vulnerability testing. As I recall a lab where
we simulated phishing attacks and analyzed how human psychology played a huge role in
security breaches. This experience help strengthened the foundation in becoming a penetration
and vulnerability tester.
Another defining moment in my academic journey was the hands-on coursework in
cybersecurity, where I worked in simulated network security monitoring and threat detecting
exercise. These types of activities exposed to the fast-paced environment of cyberthreat
intelligence and the importance of real-time data analysis. This type of practical experience
supported my desire to work in cybersecurity while also noting the need for interdisciplinary
approaches. As Smith (2017) stated, understanding the motivations behind cybercriminal
behavior is important in developing effective defense mechanisms.
My ePortfolio contains some discussion posts where I reflected on some real-world
cybersecurity incidents and their broad implications. Referring to a specific discussion. I
analyzed the impact of ransomware attacks on healthcare institutions, making an emphasis on not
just the financial costs bust also the ethical concerns that surround patient data security. These
discussions helped refine my analytical skills and reinforcing my belief in cybersecurity as field
that required continuous adaptation and constant learning.
Moving forward, my coursework experience included some expose to security operations
center (SOC) protocols, where I learned how to respond to active cyber threats. In one case, it
involved investigating an ongoing brute-force attack in corporate network. My role in
documenting in analyzing the attack patterns showed the importance of proactive threat detection
and response. This type of real-world application of my studies helped solidified my confidence
in pursuing cybersecurity as a career.
Connecting Social Science and Cybersecurity
One of the more eye-opening perspectives of my education was noticing how social
science principles connect with cybersecurity. With the rise of cyber-enabled workplace
deviance, which I studied in a research project, showed how technology can be used both
ethically and in unethical behavior in professional settings. Nguyen (2019) goes on about how
organizational culture and human behavior can influence cybersecurity risks, a concept which
became evident in my research.
Through one of my studies, I also learned that cybersecurity professionals must consider
not only technological solutions but also both the psychological and sociological factors that
contribute to different security vulnerabilities. This realization has some influence on my career
aspirations, thus pushing me towards roles that require both technical expertise and an
understanding of human behavior.
In my career paper, located in one the tabs in my ePortfolio, explores this idea by
analyzing the roles of security analysts in preventing cybercrimes. My paper goes over how
behavioral analysis can help predict and prevent insider threats, a topic that goes along with my
growing interest in cybercrime analysis. Also, my journal entries document my different
perspectives on cybersecurity ethics, specifically in relation to marginalized communities and
digital divide.
Moving forward, one of the more thought-provoking discussions in my coursework
involved a lot of analyzing the ethical implications of Artificial Intelligence (AI) within
cybersecurity. It’s the potential AI-driven security solutions that raises concerns about privacy,
bias, and accountability. By engaging in these discussions, it helped me evaluate the correlation
of emerging technologies and ethical responsibilities, shaping my perspective on cybersecurity’s
continuous evolving landscape.
Conclusion
As I continue my journey in cybersecurity career, I’m very committed to have integrated
both technical and social science perspectives to address modern security challenges. My
academic experiences at ODU, along with practical exposure through course work, it has
provided me a solid foundation to pursue roles in cybercrime analysis, penetration testing, and
security architecture.
Cybersecurity itself is not simply about protecting systems; It’s the understanding of
people behind the screens, both attackers and users. By continuing to apply interdisciplinary
approaches, I hope to contribute somewhat to the field and develop security solutions that
address both the technological and human factors.
My ePortfolio serves as reflection of my journey, showing my growth in the field and
commitment to lifelong learning. As I continue to build my career, I do plan to continue to
expand my knowledge, engaging in discussions on current emerging threats, and balancing both
technical and social science insights in order to make a meaningful impact in cybersecurity.
One of my future goals to achieve industry-recognized certifications, such as the
Certified Ethical Hacker (CEH) or Offensive Security certified Professional (OSCP) and
CompTIA Security + and A +. These certifications will not only verify that I understand the
cybersecurity field but, it will deepen my knowledge/expertise in penetration testing and ethical
hacking, reinforcing my commitment to learning. Also, I aspire to contribute to cybersecurity
research, specifically in areas of threat intelligence and digital forensics, in order to advance the
field and develop innovated solutions for any cyber threats.