{"id":314,"date":"2026-02-12T18:55:53","date_gmt":"2026-02-12T18:55:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mhass016\/?page_id=314"},"modified":"2026-02-12T22:27:09","modified_gmt":"2026-02-12T22:27:09","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mhass016\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>About the Subject<\/strong><\/h3>\n\n\n\n<p>CYSE_201S explores the intersection of <strong>cybersecurity and social science<\/strong>, focusing on how <strong>technology, human behavior, and social interactions<\/strong> affect digital security. Students work on <strong>article reviews, case studies, presentations, and career research<\/strong>, developing skills to analyze both technical and social aspects of cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"526\" src=\"https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/222222.png\" alt=\"\" class=\"wp-image-337\" srcset=\"https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/222222.png 1024w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/222222-300x154.png 300w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/222222-768x395.png 768w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/222222-584x300.png 584w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Career Focus 1: Social Cybersecurity Analyst<\/strong><\/h2>\n\n\n\n<p><strong>Description:<\/strong><br>Social Cybersecurity Analysts protect communities and organizations from <strong>online manipulation, misinformation, and social engineering attacks<\/strong>. This role focuses on <strong>human behavior and digital communities<\/strong>, complementing traditional cybersecurity.<\/p>\n\n\n\n<p><strong>Responsibilities:<\/strong><\/p>\n\n\n\n<ul>\n<li>Monitor social media for disinformation campaigns.<\/li>\n\n\n\n<li>Identify bots, trolls, and manipulative content.<\/li>\n\n\n\n<li>Analyze social networks to detect risks and patterns.<\/li>\n\n\n\n<li>Advise policymakers and organizations on online threat mitigation.<\/li>\n<\/ul>\n\n\n\n<p><strong>Skills Needed:<\/strong><\/p>\n\n\n\n<ul>\n<li>Social network analysis, data mining, computational social science.<\/li>\n\n\n\n<li>Knowledge of psychology, communication, and human behavior.<\/li>\n\n\n\n<li>Familiarity with AI, NLP, and automated threat detection tools.<\/li>\n\n\n\n<li>Critical thinking and ethical decision-making.<\/li>\n<\/ul>\n\n\n\n<p><strong>Career Opportunities:<\/strong><\/p>\n\n\n\n<ul>\n<li>Government intelligence agencies<\/li>\n\n\n\n<li>Social media and cybersecurity firms<\/li>\n\n\n\n<li>Research institutions<\/li>\n\n\n\n<li>Nonprofits promoting digital literacy<\/li>\n<\/ul>\n\n\n\n<p><strong>Image Placeholder:<\/strong><br><em>Insert an image showing social media analysis or BEND framework<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"497\" src=\"https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/ChatGPT-Image-Feb-12-2026-05_21_30-PM.png\" alt=\"\" class=\"wp-image-338\" srcset=\"https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/ChatGPT-Image-Feb-12-2026-05_21_30-PM.png 1024w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/ChatGPT-Image-Feb-12-2026-05_21_30-PM-300x146.png 300w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/ChatGPT-Image-Feb-12-2026-05_21_30-PM-768x373.png 768w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/ChatGPT-Image-Feb-12-2026-05_21_30-PM-600x291.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Career Focus 2: Digital Forensics Analyst<\/strong><\/h2>\n\n\n\n<p><strong>Description:<\/strong><br>Digital Forensics Analysts <strong>investigate cybercrimes<\/strong>, recover evidence, and support legal or corporate investigations. This career combines <strong>technical expertise with investigative skills<\/strong>.<\/p>\n\n\n\n<p><strong>Responsibilities:<\/strong><\/p>\n\n\n\n<ul>\n<li>Investigate cyberattacks, fraud, and data breaches.<\/li>\n\n\n\n<li>Recover deleted or encrypted data from devices.<\/li>\n\n\n\n<li>Analyze evidence for legal or corporate proceedings.<\/li>\n\n\n\n<li>Collaborate with law enforcement or corporate security teams.<\/li>\n<\/ul>\n\n\n\n<p><strong>Skills Needed:<\/strong><\/p>\n\n\n\n<ul>\n<li>Knowledge of operating systems, file systems, and network protocols.<\/li>\n\n\n\n<li>Familiarity with forensic tools: EnCase, FTK, Autopsy.<\/li>\n\n\n\n<li>Understanding of cyber law and evidence handling.<\/li>\n\n\n\n<li>Analytical thinking and attention to detail.<\/li>\n<\/ul>\n\n\n\n<p><strong>Career Opportunities:<\/strong><\/p>\n\n\n\n<ul>\n<li>Law enforcement and federal agencies (FBI, Cyber Crime Units)<\/li>\n\n\n\n<li>Private cybersecurity firms<\/li>\n\n\n\n<li>Consulting firms specializing in incident response<\/li>\n<\/ul>\n\n\n\n<p><strong>Image Placeholder:<\/strong><br><em>Insert an image of a digital forensics lab or investigation process<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"506\" src=\"https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/11111.png\" alt=\"\" class=\"wp-image-336\" srcset=\"https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/11111.png 1024w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/11111-300x148.png 300w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/11111-768x380.png 768w, https:\/\/sites.wp.odu.edu\/mhass016\/wp-content\/uploads\/sites\/40779\/2026\/02\/11111-600x296.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Career Focus 3: Network Security Engineer<\/strong><\/h2>\n\n\n\n<p><strong>Description:<\/strong><br>Network Security Engineers ensure <strong>the security and integrity of an organization\u2019s computer networks<\/strong>. This is a <strong>highly technical role<\/strong> critical to preventing cyber attacks.<\/p>\n\n\n\n<p><strong>Responsibilities:<\/strong><\/p>\n\n\n\n<ul>\n<li>Design and maintain secure networks.<\/li>\n\n\n\n<li>Monitor network traffic for suspicious activity.<\/li>\n\n\n\n<li>Respond to breaches and security incidents.<\/li>\n\n\n\n<li>Develop firewalls, VPNs, and intrusion detection systems.<\/li>\n<\/ul>\n\n\n\n<p><strong>Skills Needed:<\/strong><\/p>\n\n\n\n<ul>\n<li>Networking protocols, firewalls, VPNs, IDS\/IPS systems.<\/li>\n\n\n\n<li>Knowledge of cybersecurity standards and risk management.<\/li>\n\n\n\n<li>Incident response and problem-solving skills.<\/li>\n\n\n\n<li>Cloud security and network monitoring expertise.<\/li>\n<\/ul>\n\n\n\n<p><strong>Career Opportunities:<\/strong><\/p>\n\n\n\n<ul>\n<li>IT departments in large corporations<\/li>\n\n\n\n<li>Cybersecurity firms and MSSPs<\/li>\n\n\n\n<li>Government agencies protecting critical infrastructure<\/li>\n<\/ul>\n\n\n\n<p><strong>Image Placeholder:<\/strong><br><em>Insert an image of network monitoring or security infrastructure<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Career Outlook<\/strong><\/h2>\n\n\n\n<p>Demand for professionals in <strong>Social Cybersecurity, Digital Forensics, and Network Security<\/strong> is <strong>growing rapidly<\/strong>. These careers require a <strong>blend of technical expertise, investigative skills, and social science knowledge<\/strong> to safeguard individuals, organizations, and society.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Common Tools &amp; Methods<\/strong><\/h2>\n\n\n\n<ul>\n<li><strong>Social Cybersecurity:<\/strong> BEND Framework, BotHunter, MemeHunter, social network analysis, AI\/NLP tools<\/li>\n\n\n\n<li><strong>Digital Forensics:<\/strong> EnCase, FTK, Autopsy, mobile and cloud forensics<\/li>\n\n\n\n<li><strong>Network Security:<\/strong> Firewalls, IDS\/IPS, SIEM, VPNs, penetration testing tools<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About the Subject CYSE_201S explores the intersection of cybersecurity and social science, focusing on how technology, human behavior, and social interactions affect digital security. Students work on article reviews, case studies, presentations, and career research, developing skills to analyze both technical and social aspects of cybersecurity. Career Focus 1: Social Cybersecurity Analyst Description:Social Cybersecurity Analysts&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mhass016\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":32138,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/pages\/314"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/users\/32138"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/comments?post=314"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/pages\/314\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/pages\/314\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mhass016\/wp-json\/wp\/v2\/media?parent=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}