{"id":34,"date":"2025-12-08T04:48:02","date_gmt":"2025-12-08T04:48:02","guid":{"rendered":"https:\/\/student.wp.odu.edu\/abrow247\/?page_id=34"},"modified":"2025-12-08T04:48:02","modified_gmt":"2025-12-08T04:48:02","slug":"cybersecurity-professional-career-paper","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/abrow247\/cybersecurity-professional-career-paper\/","title":{"rendered":"Cybersecurity Professional Career Paper"},"content":{"rendered":"\n<p>A Cybersecurity Architect is a person whose responsibility is for planning, designing,<br>testing, implementing and maintaining the security systems that protect an organization\u2019s<br>computer and network infrastructure. They\u2019re importance in the modern world comes from their<br>senior position and experience in knowing a lot about network infrastructure and security to<br>design a security system that would best protect the organization and effectively communicating<br>that method to stakeholders in a way that would allow them to implement a system over another.<br>This paper is to help further understand the roles and importance of a cybersecurity architect.<br>A cybersecurity architect\u2019s role in understanding behaviors comes from a couple of<br>different ways, one of which comes from their experience with bad actors and hackings to come<br>up with a design for a network infrastructure that would most effectively combat a potential<br>hacker\u2019s most common ways of infiltrating a system, constantly updating and maintaining the<br>system to constantly keep it from being attacked or messed with. Another way understanding the<br>human behaviors related to a cybersecurity architect comes with a professional\u2019s role in helping<br>to communicate between stakeholders in their methods and likeminded employees who are<br>engineers and other IT roles to help implement and design the system itself.<br>A Security Architect utilized a lot of key concepts for their systems. One of which are<br>their understanding of research needed to learn about how a bad actor will behave in a unsecure<br>system and how they will infiltrate the system itself. They also implement within the field their<br>knowledge of different cybercrimes and methods and build systems to help defend from that<br>issue occurring. My goals are to become a cybersecurity architect so that I can learn about these<br>systems to help an organization and most importantly the community that would revolve around<br>it. This Career\u2019s connection to society comes in the most important task of managing the entire<br>network system as a whole as without them the whole system would fall apart.<br>Works Cited<br>\u201cCybersecurity Architects Are Responsible for Designing, Developing and Implementing<br>the Security Systems That Protect an Organization\u2019s Information Technology (IT) Network.\u201d<br>Cybersecurity Architect: Salary, Job Description and Education, 14 June 2023,<br>www.augusta.edu\/online\/blog\/cybersecurity-architect-salary.<br>Moore, Michelle. \u201cSecurity Architect Career &amp; Salary Guide.\u201d University of San Diego Online<br>Degrees, 13 Mar. 2025, onlinedegrees.sandiego.edu\/cyber-security-architect\/.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>\u201cSecurity Architect | Cisa.\u201d Security Architect, www.cisa.gov\/careers\/work-rolessecurity-<br>architect. Accessed 17 Nov. 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Cybersecurity Architect is a person whose responsibility is for planning, designing,testing, implementing and maintaining the security systems that protect an organization\u2019scomputer and network infrastructure. They\u2019re importance in the modern world comes from theirsenior position and experience in knowing a&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/abrow247\/cybersecurity-professional-career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31437,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/34"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/users\/31437"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/34\/revisions"}],"predecessor-version":[{"id":35,"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/pages\/34\/revisions\/35"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/abrow247\/wp-json\/wp\/v2\/media?parent=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}