{"id":309,"date":"2025-12-08T00:03:31","date_gmt":"2025-12-08T00:03:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/robynbrown\/?p=309"},"modified":"2025-12-08T00:03:31","modified_gmt":"2025-12-08T00:03:31","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/robynbrown\/2025\/12\/08\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Cybersecurity Incident Response Analyst&nbsp;<br>Robyn Brown&nbsp;<br>School of Cybersecurity, Old Dominion University&nbsp;<br>CYSE 201S: Cybersecurity and the Social Sciences&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\">Diwakar Yalpi&nbsp;<br>November 16, 2025&nbsp;&nbsp;<\/p>\n\n\n\n<p>Cybersecurity Incident Response Analyst rely heavily on social science principles such as, psychology, sociology, human behavior, equity issues, and risk perception to investigate cyberattacks, protect digital systems, and support diverse groups of people who rely on secure technology every day. Their work blends technical skill with an understanding of human motivations, organizational culture and societal Inequalities making social science essential to the profession.&nbsp;<\/p>\n\n\n\n<p><strong>Introduction<\/strong>&nbsp;<\/p>\n\n\n\n<p>Cybersecurity is one of the fastest growing fields in the world, and it has become essential to how we live, work, and communicate. As someone studying cybersecurity and building a career in this field, I have learned that technology alone does not keep people safe. Understanding human behavior is just as important. One career that shows this clearly is cybersecurity incident response analyst. These professionals investigate and respond to cyber incidents, but their work is heavily shaped by social science and the study of people. This paper explores how social science principles appear in their daily world, how this career impacts society, and why it matters especially for marginalized communities who are often the most vulnerable online.&nbsp;<\/p>\n\n\n\n<p><strong>Social Science Principles in the IR Analyst Role<\/strong>&nbsp;<\/p>\n\n\n\n<p>Even though cybersecurity sounds strictly technical, Incident Response (IR) relies heavily on understanding people. A major part of the job is trying to figure out why someone is behind an attack. Motivation matters, and psychology research has helped show cybercrime is often driven by financial stress, curiosity, revenge or even boredom (Hadlington, L. 2017). When analysts know what drives attackers, they can better predict what the next attacker may do next.&nbsp;<\/p>\n\n\n\n<p>Social psychology also helps explain why so many successful attacks begin with social engineering. Hackers do not need advanced code when they can trick someone into giving up sensitive information. Analysts study patterns in user mistakes, like why people click on certain links or fall for authority-based scams. This helps them advise organizations on more effective security awareness training that meets people where they are instead of blaming them for being human.&nbsp;<\/p>\n\n\n\n<p>Human computer interaction (HCI) is another important principle. Many incidents happen because policies do not match how people behave. IR analysts recognize security must be usable, and they often collaborate with teams to redesign processes that reduce human error. In this way, social science becomes part of cybersecurity strategy, not something separate from it.&nbsp;<\/p>\n\n\n\n<p><strong>Applying Key Cybersecurity Concepts in the Field<\/strong>&nbsp;<\/p>\n\n\n\n<p>The incident response field puts core cybersecurity concepts into practice every single day. Analysts constantly examine how an incident threatens confidentiality, integrity, or availability and use risk management principles to prioritize what needs immediate attention. Threat modeling tools like MITRE ATT&amp;CK help analysts understand attacker patterns, but this analysis also relies on understanding human decision making, both attackers and regular users inside the organization.&nbsp;<\/p>\n\n\n\n<p>Compliance and ethics also shape the job. Whether the organization handles health records, student data, or financial information, analysts must follow strict laws and privacy guidelines. Understanding how people feel about surveillance, data sharing, and organizational trust helps analysts respond to incidents in ethical and socially responsible ways.&nbsp;<\/p>\n\n\n\n<p><strong>Marginalization and Cybersecurity&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p>One of the most overlooked parts of cybersecurity is how differently it affects marginalized groups. Many low income and minority communities face higher risk online because they have less access to cybersecurity education or tools. Research shows these groups are more likely to be targeted in scams identity theft, and data exploitation (Gangadharan &amp; Niklas 2019).&nbsp;<\/p>\n\n\n\n<p>Incident Response Analyst are often among the first to notice when certain groups are disproportionately affected by the breach. They help advocate for stronger protections, clearer communication, and more inclusive security policies. As someone who is visually impaired and part of a marginalized community myself, I understand how important digital safety is. Increasing diversity in cybersecurity is not just a talking point; it directly impacts who gets protected and how well.&nbsp;<\/p>\n\n\n\n<p><strong>Career Connection to Society<\/strong> <strong><\/strong>&nbsp;<\/p>\n\n\n\n<p>Incident Response Analyst play a significant role in protecting both organizations and everyday people. Their work keeps hospitals running, secure financial systems, and helps schools and government agencies recover from cyberattacks. Because so much of our society depends on technology, one successful attack can disrupt thousands of lives. IR professionals help prevent those disruptions and restore trust in digital spaces.&nbsp;<\/p>\n\n\n\n<p>They also support national cybersecurity policies and frameworks like NIST and CISA guidelines. In a world where cybersecurity and society constantly overlap, IR analysts help maintain stability in a digital landscape that affects all of us.&nbsp;<\/p>\n\n\n\n<p><strong>Scholarly Journal Sources<\/strong>&nbsp;<\/p>\n\n\n\n<p>Hadlington, L. (2017). The study investigates how individual psychological\/behavioural traits relate to engagement in risky cybersecurity patterns.&nbsp;<\/p>\n\n\n\n<p>Gangadharan &amp; Niklas (2019) highlight digital inequality and how marginalized groups face more online risk.Their work connects directly to why cybersecurity professionals must be aware of social barriers that have certain communities more exposed to cyber threats.&nbsp;<\/p>\n\n\n\n<p>Workman (2008) shows how social engineering relies on psychological manipulation, which helps explain why user behavior is such a major part of incident response and cybersecurity training.&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion<\/strong>&nbsp;<\/p>\n\n\n\n<p>The work of a cybersecurity Incident Response Analyst goes far beyond analyzing logs or blocking malicious code. It is a career rooted in understanding human behavior social influences, and how digital threats affect different communities. Social science helps analysts identify motivations, reduce user vulnerabilities, and respond ethically to incidents. As technology continues to shape society, the blend of cybersecurity and social science becomes even more important. This career not only protects organizations but also supports the safety, privacy, and dignity of people from all backgrounds, especially those who are most vulnerable. For me, the connection between cybersecurity and real people is what makes the field meaningful and worth pursuing.&nbsp;<\/p>\n\n\n\n<p><strong>References<\/strong>&nbsp;<\/p>\n\n\n\n<p>Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346. <a href=\"https:\/\/doi.org\/10.1016\/j.heliyon.2017.e00346\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.1016\/j.heliyon.2017.e00346<\/a>&nbsp;<\/p>\n\n\n\n<p>Gangadharan, S. P., &amp; Niklas, J. (2019). Decentering technology in digital justice. <em>Information, Communication &amp; Society, 22<\/em>(7), 882\u2013899. <a href=\"https:\/\/doi.org\/10.1080\/1369118X.2019.1593484\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.1080\/1369118X.2019.1593484<\/a>&nbsp;<\/p>\n\n\n\n<p>Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. <em>Journal of the American Society for Information Science and Technology, 59<\/em>(4), 662\u2013674. <a href=\"https:\/\/doi.org\/10.1002\/asi.20779\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.1002\/asi.20779<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Incident Response Analyst&nbsp;Robyn Brown&nbsp;School of Cybersecurity, Old Dominion University&nbsp;CYSE 201S: Cybersecurity and the Social Sciences&nbsp; Diwakar Yalpi&nbsp;November 16, 2025&nbsp;&nbsp; Cybersecurity Incident Response Analyst rely heavily on social science principles such as, psychology, sociology, human behavior, equity issues, and risk perception to investigate cyberattacks, protect digital systems, and support diverse groups of people who rely&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/robynbrown\/2025\/12\/08\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":31350,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/posts\/309"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/users\/31350"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/posts\/309\/revisions"}],"predecessor-version":[{"id":310,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/posts\/309\/revisions\/310"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/media?parent=309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/categories?post=309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robynbrown\/wp-json\/wp\/v2\/tags?post=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}