Visualization tools are used extensively in the cybersecurity domain for various tasks such as network forensics, investigating cyber-attacks, finding vulnerabilities, and reporting findings to decision makers. However, many of the tools utilized in the field are often either commercially produced and require extensive tailoring to function in specific contexts or created by the practitioners themselves. Adoption rates of visualization tools created in academia remain relatively low in practice. The visualization research community is equipped with several design methodologies to approach multidisciplinary visualization challenges and collaborations. However, there are many factors that differentiate the cybersecurity domain space that require more methodological considerations. Some of these considerations include the streaming and continuous nature of the data, complex network and attack scenarios, differences in the user tasks and characterization, as well as an evolving threat landscape. When traditional visualization methodologies are applied to the cybersecurity domain space, there are noted deficiencies that require new approaches. Additionally, feedback from cybersecurity practitioners suggests challenges that arise with adopting new tools that do not entirely fit their existing contexts, processes, and workflows, which, combined with the methodological considerations, leads to lower adoption rates and the need to more fully understand these operational environments.This dissertation addresses these challenges through four works and contributes new approaches, insights, strategies, and reflections for future researchers working with practitioners at the cross-section of visualization and cybersecurity. To do this, I present a mix of ethnographic and qualitative research contributing strategies for incorporating disciplinary diversity of approach, a formalization of visualization techniques for large backbone networks, a novel survey methodology for security related visualization tools, insights on how external context influences cybersecurity visualizations in practice, and an approach for better aligning visualization design methodologies with rapid practitioner technological development of small tactical networks. I identify three different dimensions of potential approaches to visualization design for cybersecurity including technique, context, and process; each captured by working with distinct communities of practice. Overall, our goals are to define the broader challenges experientially, propose approaches that accommodate these challenges in practice, better bridge the gap between academia and industry through reflections and insights on specific applications, and widen the pool of approaches to visualization design through the context of cybersecurity.