Primary Objective
Students will experience authentic cybersecurity Work Roles through collaborative incident response, understanding how human decision-making and AI analysis combine in crisis situations.
Experiencing NICE Work Roles Through Human-AI Collaboration (Grades 6-8)
Dr. Ryan Straight
December 7, 2025
Students experience authentic NICE Framework Work Roles by responding to realistic security incidents. Each team member assumes a specific role while collaborating with AI as their technical analyst. This activity demonstrates how different cybersecurity professionals work together during actual incidents.
Duration: 50-60 minutes Grade Levels: 6-8 (with role complexity variations) Group Size: Teams of 3-4 students Technology Requirements: One device per team minimum, ideally one per student
Students will experience authentic cybersecurity Work Roles through collaborative incident response, understanding how human decision-making and AI analysis combine in crisis situations.
Students actively experience roles: Incident Commander, SOC Analyst, Threat Intelligence Specialist, Communications Coordinator
Incident Commander (IC) - Makes final decisions - Coordinates team response - Manages resource allocation - Consults AI for impact assessment
SOC Analyst - Monitors system alerts - Analyzes technical indicators - Partners with AI for pattern recognition - Reports findings to IC
Threat Intelligence Specialist - Researches attack methods - Identifies threat actors - Uses AI to analyze TTPs (Tactics, Techniques, Procedures) - Provides context to team
Communications Coordinator - Drafts stakeholder messages - Manages information flow - Works with AI to craft clear explanations - Documents response timeline
Initial Alert: Monday, 7:45 AM Several teachers report they cannot access their lesson plans. Files show a “.locked” extension with a ransom note demanding cryptocurrency.
Evidence Available: - Email logs showing suspicious attachment opened Friday afternoon - Network traffic spike over the weekend - 30% of school computers affected - Backup system status: Last successful backup Thursday night
Critical Decisions Required: 1. Isolate affected systems or shut down entire network? 2. Contact law enforcement immediately or assess damage first? 3. Inform parents/community now or after initial response? 4. Attempt recovery from backups or negotiate with attackers?
Initial Alert: Wednesday, 2:30 PM Anonymous tip claims student grades have been changed in the system. Initial check confirms several suspicious modifications.
Evidence Available: - Unauthorized admin account created two weeks ago - Grade changes pattern: All failing grades changed to passing - IP logs show access from multiple locations - Student information potentially exposed
Critical Decisions Required: 1. Lock down grade system or maintain access for investigation? 2. Notify affected students/parents individually or mass communication? 3. Invalidate current grades or attempt to restore originals? 4. Involve student discipline process or focus on system security?
Initial Alert: Thursday, 11:00 AM School social media accounts compromised, posting inappropriate content and threats. Posts going viral with media attention growing.
Evidence Available: - Password reset emails ignored by staff - Account access from foreign IP addresses - Coordinated attack across multiple platforms - Personal information of staff being posted
Critical Decisions Required: 1. Delete accounts or attempt recovery? 2. Issue public statement or stay silent until resolved? 3. Lock down all school digital assets or targeted response? 4. Legal action priorities: Criminal investigation or civil remedies?
flowchart LR
subgraph P1["Phase 1: Initial Assessment"]
A1[Read Scenario]
A2[Assign Roles]
A3[AI Consultation]
end
subgraph P2["Phase 2: Response Planning"]
B1[Technical Findings]
B2[Attacker Context]
B3[IC Decisions]
end
subgraph P3["Phase 3: Response Execution"]
C1[Execute Plan]
C2[Handle Complications]
C3[Adapt & Document]
end
subgraph P4["Phase 4: After-Action Review"]
D1[Team Debrief]
D2[Career Insights]
end
P1 --> P2 --> P3 --> P4
For IC: “As my incident response advisor, what are the top 3 immediate actions we should prioritize for [scenario type]?”
For SOC: “Help me analyze these technical indicators: [list evidence]. What attack patterns do you recognize?”
For Threat Intel: “Based on these characteristics [list], what type of threat actor might be responsible?”
For Comms: “What key information should we include in our initial incident notification?”
| Time | Decision Point | Options Considered | AI Input | Final Decision | Rationale |
|---|---|---|---|---|---|
| T+5min | Network isolation | Full/Partial/None | [AI recommendation] | [Team choice] | [Reasoning] |
| T+10min | Stakeholder notification | Immediate/Delayed | [AI suggestion] | [Team choice] | [Reasoning] |
Teams execute their response plan while managing emerging complications:
Complication Injections (Instructor introduces at 5-minute intervals):
| Criteria | Emerging (1) | Developing (2) | Proficient (3) | Advanced (4) |
|---|---|---|---|---|
| Role Execution | Unclear on role duties | Basic role understanding | Clear role performance | Leadership within role |
| Team Collaboration | Works independently | Some coordination | Good teamwork | Exceptional synergy |
| AI Partnership | AI as answer source | AI as advisor | True partnership | Strategic AI use |
| Decision Quality | Random choices | Some reasoning | Logical decisions | Strategic thinking |
| Communication | Unclear messages | Basic clarity | Clear and appropriate | Professional quality |
| NICE Alignment | No connection | Some awareness | Clear connections | Deep understanding |
This table shows how activity elements connect to assessment rubric criteria:
| Rubric Criterion | Developed Through | Evidence Source |
|---|---|---|
| AI Partnership Framing | Phase 1 AI Consultation Prompts: role-specific queries | Quality and specificity of AI questions asked |
| Complementary Strengths | Role distribution: IC decisions, SOC analysis, Threat Intel context | Decision Log documenting AI input vs. human choice |
| AI Limitation Awareness | Complication Injections requiring adaptation beyond AI recommendations | Documented plan changes and rationale |
| Synthesis Quality | Phase 2: Collaborative planning combining technical + contextual factors | Final response plan integrating all role inputs |
| Human Context Application | Phase 4 Debrief: “Career insights” and role reflection | After-action review responses |
| Decision Justification | Decision Log Template: Options, AI Input, Final Decision, Rationale | Completed decision documentation |
| NICE Framework Application | Role Cards explicitly tied to NICE Work Roles | Career insights discussion and debrief responses |
Applicable Rubrics: Human-AI Collaboration Rubric, NICE Framework Application Rubric
Combine two scenarios simultaneously (e.g., ransomware during grade breach investigation)
Research and respond to famous real incidents (WannaCry, SolarWinds, Colonial Pipeline)
One team plays attackers while another defends, AI assists both sides
After incident, create new security policies to prevent recurrence