Cybersecurity Professional Career Paper: Cybersecurity Analyst

Mehmet Cuce
Old Dominion University
CYSE201s
Prof. Diwakar Yalpi
11/15/25

Introduction
The main job of a cybersecurity analyst is to protect networks and systems from
cybersecurity threats. These attacks are often different in the layer of severity, so cybersecurity
analysts have to treat every threat seriously. Typically, analysts investigate cyber attacks, create
strategies against them and actively prevent them from happening. Cybersecurity analysts act as
one of the first lines of defense against potential threats. Technological integration within major
infrastructure, workplaces and government systems has created a need for greater security
measures. This need is fulfilled by cybersecurity analysts, as the job requires constant learning
and evolving. The goal of this paper is to explore cybersecurity analysts from a social science
perspective, by explaining how human behavior, motivation and societal factors affect how
analysts approach cybersecurity.

The Role of Social Science
While the job of a cybersecurity analyst is based on safeguarding technology, it has to be
understood that technology exists as a tool for society. Understanding how this tool is being
used, why and when relies on understanding the social science of cybersecurity. This is where
social science becomes key to explaining how social networks, subcultures, individual and group
behaviors contribute to cyber threats. The main principles of social science are: Determinism,
Relativism, Objectivity, Ethical Neutrality, Skepticism, Empiricism and Parsimony. These
principles aim to help analysts understand cybersecurity through a social framework.
This understanding of social sciences enables cybersecurity analysts to spread awareness and
educate people on threats, which strengthens not only systems security but creates greater
responsibility. For example, instead of just telling someone to not click on a suspicious email, analysts can create guidelines to identify, report and eliminate threats. By doing so, cybersecurity
analysts are effectively changing user behavior and not only addressing the technological side,
but the social side as well.

Application of Key Concepts
The human factor, in the context of cybersecurity, is the study of how human behaviors, such as
social engineering, decision making skills and errors, affect systems. Oftentimes, the greatest
vulnerability of systems are the human factors. Many of the threats that cybersecurity analysts
have to deal with are related to the human factor. Phishing, identity theft, and unauthorized
access by trusted users exploit human weaknesses rather than relying on exploiting technological
issues. These attacks are also under the umbrella of the concept of social engineering, which is
the use of psychology to manipulate individuals into creating vulnerabilities in systems.
Understanding the psychology of both the perpetrator and the victim, helps cybersecurity
analysts determine motives behind attacks, create strategies to help victims identify threats and
prevent future threats from happening. Another key concept that cybersecurity analysts use is
human systems integration, which heavily emphasizes focus on humans. While certain
precautions like firewalls or zero trust architecture prove to be effective at mitigating threats, if a
system lacks consideration for humans, then it creates a massive gap in security. This
vulnerability is why human systems integration proves to be such a valuable concept to
cybersecurity analysts.

Marginalization
Marginalized groups have often faced great challenges in the world of cybersecurity. More often
than not, these groups do not have equal access to education and resources which creates opportunities for cybercriminals to exploit them. Biases against these groups can make their
struggles go unnoticed, or create social standards that they cannot meet. For example, attackers
frequently target individuals who would not be able to identify threats or potential scams. Due to
lack of education on proper cybersecurity protocol, these individuals fall victim and do not have
the resources to prevent the attacks. It is the job of cybersecurity analysts to protect these groups
by analyzing the methodology of the bad actors, as well as understanding the mentality of both
victim and attacker to develop strategies. These strategies would focus on ease of use,
consideration of human elements and educating victims to prevent future attacks.

Contributions to Society
Cybersecurity analysts are providing major contributions to society, by acting as the first line of
defense against threats. Almost all services and major infrastructure utilize technology. The
technological systems allow for constant innovation, access to services and quality of life. With
the evolution of technology, comes the evolution of cyberthreats. That is why cybersecurity
analysts provide such an important service, as their duty is maintaining infrastructure, critical
services and data privacy across all sectors. Through constant evolution and adaptation,
cybersecurity analysts are able to keep up with cybersecurity threats.

Supporting Articles
1. This first article titled “The Future Cybersecurity Workforce: Going Beyond Technical
Skills for Successful Cyber Performance”, helped me support my points on social
science principles. It explained the gaps in work roles and education practices through the
technological and social lenses. Emphasizing the human element as a key factor to a
successful system.

2. The second article titled “The Role of User Behaviour in Improving Cyber Security
Management”, Identified the effects on how psychological traits and individual
differences amongst system users explain vulnerabilities to cybersecurity threats. This
supported my statements on marginalized communities as it highlighted how individuals
follow different standards in their approach to systems.

3. The last article titled “A survey of social cybersecurity: Techniques for attack detection,
evaluations, challenges, and future prospects” supported the application of key concepts
by providing data on the methodology of attackers.

References
Dawson, J., & Thomson, R. (2018). The Future Cybersecurity Workforce: Going Beyond
Technical Skills for Successful Cyber Performance. Frontiers in psychology, 9, 744.
https://doi.org/10.3389/fpsyg.2018.00744


Moustafa, A. A., Bello, A., & Maurushat, A. (2021). The Role of User Behaviour in Improving
Cyber Security Management. Frontiers in psychology, 12, 561011.
https://doi.org/10.3389/fpsyg.2021.561011


Mulahuwaish, A., & Aos, M. (2025). A survey of social cybersecurity: Techniques for attack
detection, evaluations, challenges, and future prospects. Computers in Human Behavior
Reports, 18, 100668.
https://doi.org/10.1016/j.chbr.2025.100668