Cybersecurity Professional Career Paper: Cybersecurity Analyst By Sincere Hines
Introduction
Cybersecurity plays a major role in almost everything we do today. With so much of our personal and professional lives moving online, security threats have become more common and more complicated. One job that stands at the center of this fight is the cybersecurity analyst. Analysts protect networks, monitor for suspicious activity, and help prevent attacks before they happen. The purpose of this paper is to break down what a cybersecurity analyst does and explain how social science concepts like human behavior, communication, and social structures shape the job. This paper also looks at how cybersecurity affects marginalized communities and why analysts matter to society as a whole.
Social Science Principles in the Cybersecurity Analyst Career
Even though cybersecurity sounds like a purely technical field, analysts rely heavily on social science. A big part of the job involves understanding why people behave the way they do. Cyber attackers, for example, often follow patterns that can be explained through psychology and criminology. Rational choice theory suggests attackers weigh risks and rewards before committing cybercrimes (Holt et al., 2015). Knowing this helps analysts build defenses that raise the “cost” of attacking a system.
Another important area is human–computer interaction (HCI). If a security system is confusing, people will ignore it or find shortcuts that put the organization at risk. Research shows users are more likely to bypass security steps when they feel overwhelmed (Redmiles et al., 2020). Analysts use this information to recommend security measures that are strong but still easy to follow.
Communication also plays a major role. Analysts must explain threats to everyday users who may not understand technical terms. Social science helps them craft messages that people will listen to, remember, and actually apply.
Application of Key Concepts
Key concepts from CYSE 201S directly shape the day-to-day work of cybersecurity analysts. Social engineering is a great example. Attackers often manipulate emotions like urgency, fear, or trust to trick users into giving up information. Analysts must study these tactics so they can train employees to spot them.
Risk assessment is another concept that mixes technical and social factors. Analysts do not just look at software vulnerabilities. They also examine how employees behave, how information flows through an organization, and what legal standards apply. Privacy laws, ethical guidelines, and compliance rules influence how analysts set up monitoring systems and protect sensitive data.
Tools such as insider threat detection programs and behavioral analytics platforms show how social science and technology connect. These tools look for unusual behavior patterns that might signal misuse, whether intentional or accidental. Analysts interpret these patterns and decide how to respond.
Marginalization
Cybersecurity does not affect everyone equally. Marginalized groups including low-income communities and minorities often face higher risks because they may lack access to secure technology or digital literacy resources (Gangadharan & Niklas, 2019). These groups also tend to be targeted more often in scams or fraud. Cybersecurity analysts who understand these issues can push for policies and outreach efforts that make digital spaces safer for everyone. Another challenge is that the cybersecurity workforce itself lacks diversity. Increasing representation helps ensure the field understands and protects all communities, not just those already in positions of power.
Career Connection to Society
Cybersecurity analysts contribute directly to the safety of society. They protect major systems like hospitals, banks, power grids, and government services. If these systems were attacked, the impact could be devastating. Analysts also help organizations follow laws that protect personal data, which builds public trust. Without professionals in this field, society would face constant disruption and uncertainty.
Scholarly Journal Articles
Holt, T. J., Bossler, A., & Seigfried-Spellar, K. (2015). Cybercrime and Digital Forensics. Routledge. This source explains why attackers behave the way they do and supports the section on using social science principles.
Redmiles, E. M., Kross, S., & Mazurek, M. L. (2020). Users’ perceptions of usability in security tools. Journal of Cybersecurity, 6(1), 1–15. This article shows how usability influences cybersecurity and supports the discussion on human–computer interaction.
Gangadharan, S. P., & Niklas, J. (2019). Decentering technology in digital inclusion research. Information, Communication & Society, 22(7), 982–999. This source explains how marginalized groups face unequal risks online and supports the section on digital inequality.