{"id":34,"date":"2022-03-01T18:09:46","date_gmt":"2022-03-01T18:09:46","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=34"},"modified":"2023-03-20T20:05:51","modified_gmt":"2023-03-20T20:05:51","slug":"security-analyst-career-overview","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/","title":{"rendered":"Security Analyst Career Overview"},"content":{"rendered":"<p>Security analysts, also known as information security analysts, monitor, prevent, and stop attacks on data. These professionals create and implement firewalls and software systems to protect an organization's data and networks. As the world increasingly relies on technology and digital interfaces to store and share information, cybersecurity analyst and related positions may enjoy higher demand.<\/p>\r\n\r\n<p>Information security analysts may work in the public sector, as freelance consultants, or for businesses and corporations. These professionals hold at least a bachelor's degree in their field; however, some employers seek cybersecurity analysts with master's degrees.<\/p>\r\n\r\n<p>According to the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">Bureau of Labor Statistics<\/a> (BLS), information security analysts earned a median annual salary of $102,600 in 2021. Explore this growing industry, including topics like what an information security analyst does and frequently asked questions about IT security careers.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"history\" id=\"history\"><\/a>\n\n\r\n<h2>History of Cybersecurity Analysts<\/h2>\r\n\r\n<p>The need to protect computers began before the creation of the internet, during the 1960s. Organizations began using passwords to protect their computers from others that might be able to use the machines.<\/p>\r\n\r\n<p>In the 1970s, after the creation of the <a href=\"https:\/\/www.ifsecglobal.com\/cyber-security\/a-history-of-information-security\/\" target=\"_blank\" rel=\"noopener\">Advanced Research Projects Agency Network <\/a>(ARPANET), Bob Thomas, a researcher, created a small program that was able to travel through a network while leaving a trail. He named the program CREEPER.<\/p>\r\n\r\n<p>The inventor of email, Ray Tomlinson, upgraded CREEPER to be self-replicating. This created the first worm &ndash; and the first instance of a virus. To heal the system, Tomlinson then made a program to hunt and delete CREEPER. He named it REAPER, now known as the first antivirus software.<\/p>\r\n\r\n<p>Thomas and Tomlinson's work revealed weaknesses within the ARPANET, and similar systems. Many companies and governments at the time were creating networks by linking their computers via telephone lines. Protecting these networks became a priority. <\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/diversity-in-cybersecurity\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find out about diversity in the cybersecurity field<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online CyberSecurity Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"specializations\" id=\"specializations\"><\/a>\n\n\r\n<h2>Similar Specializations and Career Paths<\/h2>\r\n\r\n<p>Information security encompasses data security careers, while cybersecurity refers to protecting data from cybercrime.<\/p>\r\n\r\n<p>Most security analysts have at least a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/bachelors-degrees\/\" target=\"_blank\" rel=\"noopener\">bachelor's degree in cybersecurity<\/a>, computer science, computer information systems, or a related field. Employers also seek candidates with field experience.<\/p>\r\n\r\n<p>Additional certifications may be necessary. Certifications validate the necessary skills required for the position, depending on the field. According to the BLS, the top-paying industries for information security analysts are information, finance, and insurance.<\/p>\r\n\r\n<table class=\"sonic-table shadow-lg\">\r\n<caption>Specializations and Career Paths<\/caption>\r\n<thead>\r\n<tr>\r\n<th>Career<\/th>\r\n<th>Description<\/th>\r\n<th>Required Education<\/th>\r\n<th>Required Experience<\/th>\r\n<th>Average Annual Salary (February 2023)<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<td><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/chief-information-security-officer-ciso\/\" target=\"_blank\" rel=\"noopener\">Chief Information Security Officer<\/a><\/td>\r\n<td>Oversees information security for the entire company<\/td>\r\n<td>At minimum a bachelor\u2019s degree in cybersecurity or related field. A master\u2019s degree can also help with gaining employment.<\/td>\r\n<td>Several years of experience across many related positions are required for this position.<\/td>\r\n<td>$173,190<\/td>\r\n<\/tr>\r\n<tr>\r\n<td><a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-consultant\/career-and-salary\/\" target=\"_blank\" rel=\"noopener\">Security Consultants<\/a><\/td>\r\n<td>Ensure internet security for individuals and corporations<\/td>\r\n<td>At minimum a bachelor\u2019s degree in a niche area. A graduate degree may help candidates earn a higher salary<\/td>\r\n<td>Experience plus intensive training bootcamps may make a candidate more desirable for a <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-consultant\/\">security consultant role<\/a>.<\/td>\r\n<td>$92,540<\/td>\r\n<\/tr>\r\n<tr>\r\n<td><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-administrator\/\" target=\"_blank\" rel=\"noopener\">Security Administrator<\/a><\/td>\r\n<td>Oversees issues related to IT security and safety<\/td>\r\n<td>Entry-level positions require a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-bachelors-in-information-technology-programs\/\">bachelor\u2019s degree in information technology<\/a> or a related field.<\/td>\r\n<td>Experience plus intensive training may allow candidates to qualify for high-paying positions.<\/td>\r\n<td>$68,610<\/td>\r\n<\/tr>\r\n<tr>\r\n<td><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-auditor\/\" target=\"_blank\" rel=\"noopener\">IT Auditor<\/a><\/td>\r\n<td>Conducts auditors of computer security systems<\/td>\r\n<td>Most employees prefer bachelor\u2019s degrees in computer science, information technology, or a related field.<\/td>\r\n<td>3-5 years of experience<\/td>\r\n<td>$74,585<\/td>\r\n<\/tr>\r\n<tr>\r\n<td><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-architect\/\" target=\"_blank\" rel=\"noopener\">IT Security Architect<\/a><\/td>\r\n<td>Anticipate potential threats and develop systems to preempt them.<\/td>\r\n<td>At minimum a bachelor\u2019s degree in information technology, computer science, or a related field.<\/td>\r\n<td>Professionals may gain experience during completion of their undergraduate programs.<\/td>\r\n<td>$134,980<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p align=\"right\">Source: <a href=\"https:\/\/www.payscale.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Payscale<\/a><\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/jobs\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover more careers in cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore cybersecurity jobs in the government sector<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online CyberSecurity Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"duties-skills\" id=\"duties-skills\"><\/a>\n\n\r\n<h2>What Does an Information Security Analyst Do?<\/h2>\r\n\r\n<p>Protecting an organization's information is a security analyst's primary goal. Analysts aim to identify weaknesses in networks' security systems, patch or respond to issues, and prevent future breaches. Security analysts may use various software, including programs designed to encrypt and protect data, to increase and strengthen security.<\/p>\r\n\r\n<p>Within larger companies and organizations, security analysts may work with teams of network, information technology (IT), and computer specialists. They often work with these other professionals to design security protocols and systems, and to protect company data from hacks and breaches.<\/p>\r\n\r\n<p>Information security analysts play crucial roles within their companies. They empower businesses and organizations to better protect customer and user data, in turn maintaining the integrity and reputation of those organizations.<\/p>\r\n\r\n<p>Traditionally, information security analysts worked with organizations in vulnerable economic sectors, such as the military, oil and gas companies, and banks. Other companies now hire security analysts to help protect their assets.<\/p>\r\n\r\n<p>Information security analysts may take on new roles as they advance within the field. For example, entry-level security analysts may assume lower-level IT security <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\" title=\"jobs\" data-wpil-keyword-link=\"linked\">jobs<\/a>, helping users navigate new systems and installing new software. More experienced analysts may design and implement entire security systems and firewalls, overseeing teams of security and IT professionals.<\/p> \r\n\r\n<p>An IT security analyst may work on anything from managing files and credentials to hacking systems to discover weaknesses. Advancing in an information security analyst role may require a consistent commitment to improving.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<sonic-callout theme=\"primary-light\">\r\n<h3 align=\"center\">Key Soft Skills for Security Analysts<\/h3>\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-3 text-gray-900\">Critical Thinking<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Critical Thinking\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"medium\">\r\n    <p>Security analysts must possess strong critical thinking skills to work through complex coding and software troubleshooting issues.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-3 text-gray-900\">Collaboration<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Collaboration\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"medium\">\r\n    <p>Security analysts often work within larger teams of IT professionals, so they need strong skills in teamwork and collaboration.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-3 text-gray-900\">Communication<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Communication\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"medium\">\r\n    <p>Working in technology requires both verbal and written communication skills. Security analysts must be able to clearly explain their work to people without tech backgrounds.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-3 text-gray-900\">Learning<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Learning\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"medium\">\r\n    <p>Jobs in security analysis require a willingness to continually learn, as the field continually changes. Security analysts must demonstrate adaptability and the ability to grow with their field.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n<\/sonic-callout>\r\n\r\n<sonic-callout theme=\"secondary-light\">\r\n<h3 align=\"center\">Key Hard Skills for Security Analysts<\/h3>\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-3 text-gray-900\">Networking<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Networking\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"medium\">\r\n    <p>Security analysts need expertise in diverse systems and networks. They need broad knowledge of various elements of network systems, along with how each element can impact security.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-3 text-gray-900\">Scripting<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Scripting\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"medium\">\r\n    <p>A working knowledge of computer scripts, like Python or C++, benefits security analysts. This knowledge allows professionals to understand encoded threats and rewrite software.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-3 text-gray-900\">Hacking<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Hacking\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"medium\">\r\n    <p>Security analysts must understand hacking processes to block and prevent cyberattacks. Ethical hacking certifications help prepare analysts to understand threats and protect systems.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-3 text-gray-900\">Operating Systems<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Operating Systems\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"medium\">\r\n    <p>Analysts must be able to work on all types of operating systems and platforms, including iOS, Windows, and Linux.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n<\/sonic-callout>\r\n\n<\/div>\n\r\n\r\n<br> \r\n\r\n<h2>A Day in the Life of a Security Analyst<\/h2>\r\n\r\n<p>The typical day for a security analyst can vary depending on the needs of the position. Both cybersecurity analysts and information security analysts may begin their day by looking over reports from the previous day or shift, including checking for any new threats and identifying malware that may have infiltrated the system.<\/p>\r\n\r\n<p>Security analysts may also prepare for and respond to system breaches or attacks. These processes might differ between workplaces, but they generally include responding to hacks or network insecurities and working to prevent new ones. On a typical day, a security analyst may connect with other IT professionals at their workplace to collaborate on data and network protection efforts.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/day-in-the-life\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about a typical day for a security analyst<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"outlook\" id=\"outlook\"><\/a>\n\n\r\n<h2>Salary and Career Outlook for Information Security Analysts<\/h2>\r\n\r\n<p>Like many other tech professionals, most security analysts tend to earn strong wages. Even the lowest-earning 10% of information security analysts earned a median annual wage of $61,520 in 2021, according to the BLS. Those in the highest 10% made more than $165,9200 that year. Keep in mind that these numbers reflect salaries in a variety of industries and roles, working at all experience levels.<\/p>\r\n\r\n<p>Several factors may influence earning potential, such as location. <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm#st\" target=\"_blank\" rel=\"noopener\">BLS data reports<\/a> that information security analysts earned the highest wages in California and New York, where they made median annual salaries over $130,000 in 2021.<\/p>\r\n\r\n<p>Education and experience also impact salary. A bachelor's degree often serves as the minimum requirement for security analysts; however, some employers may seek analysts with master's degrees, which may generate higher salaries.<\/p>\r\n\r\n<div class=\"statbox bg-tertiary-50 text-tertiary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\">Career Salary Potential for Security Analysts<\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p>\r\n\r\n<div style=\"border:2px solid black ; padding:1em\">\r\n<p style=\"color:black ; margin-top:2em\"><strong>Median Annual Salary:<\/strong> $102,600<\/p>\r\n<\/div>\r\n\r\n<p align=\"center\" style=\"margin-top:2em\"><strong>Source:<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noreferrer noopener\">BLS<\/a><\/p>    \r\n<\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/career-and-salary\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover how location affects salary for security analysts<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"become\" id=\"become\"><\/a>\n\n\r\n<h2>Becoming a Security Analyst<\/h2>\r\n\r\n<p>The process of becoming a security analyst may look slightly different from person to person, and even between specializations. However, some standards and requirements are universal. Security analysts often need a bachelor's degree in cybersecurity or a related field.<\/p>\r\n\r\n<p>Some security analysts learn the necessary skills on their own, or through <a href=\"https:\/\/www.cyberdegrees.org\/listings\/cyber-security-bootcamps\/\">bootcamps<\/a> which offer crash courses and workshops in coding and security. These workshops often lead to certificates. Earning individual certifications is also valuable.<\/p>\r\n\r\n<p>How long becoming a security analyst takes depends on your chosen educational path. The links below offer resources for getting started in your career as an security analyst, including the degree programs you may want to explore.<\/p>\r\n\r\n<ul>\r\n<li><strong><a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-engineer\/how-to-become\">Steps to Becoming a Security Analyst:<\/strong><\/a> Detailed steps one takes to become a security analyst.<\/li>\r\n<li><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/bachelors-degrees\/\">Bachelor's in Cybersecurity Programs:<\/strong><\/a> Information about a bachelor's in cybersecurity as well as other similar bachelor's degrees.<\/li>\r\n<li><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-cyber-security-bachelors-degrees\/\">Best Online Bachelor's in Cybersecurity Programs:<\/strong><\/a> Details for online bachelor's programs in cybersecurity and gives more information about the profession.<\/li>\r\n<li><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/masters-degrees\/\">Master's in Cybersecurity Programs:<\/strong><\/a> Information about pursuing a master's in cybersecurity.<\/li>\r\n<li><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-online-masters-in-cyber-security-programs\/\">Best Online Master's in Cybersecurity Programs:<\/strong><\/a> This links to online programs for a master's in cybersecurity.<\/li>\r\n<li><strong><a href=\"https:\/\/www.cyberdegrees.org\/listings\/cyber-security-bootcamps\/\">Guide to Cybersecurity Bootcamps:<\/strong><\/a> Information about why you should consider cybersecurity bootcamps<\/li>\r\n<li><strong><a href=\"https:\/\/www.cyberdegrees.org\/resources\/certifications\/\">Certifications for Cybersecurity Professionals:<\/strong><\/a> A list of certifications for cybersecurity professionals to consider. <\/li>\r\n<\/ul>\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online CyberSecurity Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n<h2>Professional Organizations for Security Analysts<\/h2>\r\n\r\n<p>Below is a list of professional organizations within the information security field. These organizations may be a great source for networking, and many of them provide information and assistance with preparation for certifications.<\/p>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/www.issa.org\/\" title=\"Information Systems Security Association\" target=\"_blank\" theme=\"accent\">\r\n<p>The ISSA is a nonprofit organization for cybersecurity professionals around the world. It aims to improve the profession and promote effective systems and practices. Members gain access to chapter meetings and educational programs.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/www.isc2.org\/\" title=\"(ISC)\u00b2\" target=\"_blank\" theme=\"accent\">\r\n<p>Founded in 1988, this international nonprofit offers a variety of certifications and professional development programs in cybersecurity. Members gain access to networking opportunities.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/www.cisecurity.org\/\" title=\"Center for Internet Security\" target=\"_blank\" theme=\"accent\">\r\n<p>This nonprofit organization aims to make the internet safer for all users. It offers a variety of membership options for both individuals and businesses.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/isalliance.org\/\" title=\"Internet Security Alliance\" target=\"_blank\" theme=\"accent\">\r\n<p>This organization emphasizes the intersection between technology, public policy, and economics. The alliance advocates for cybersecurity policies and aims to create awareness for best practices in cybersecurity.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/blackcybersecurityassociation.org\/\" title=\"Black Cybersecurity Association\" target=\"_blank\" theme=\"accent\">\r\n<p>This is a nonprofit organization with the mission to reach those <a href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-resources-for-underrepresented-populations\/\">from underrepresented communities that are interested in cybersecurity<\/a>.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<h2>Learn More About Security Analysts<\/h2>\r\n\r\n<p>For more information about how to <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/how-to-become\/\">become a security analyst<\/a>, check out the links below.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-4 gap-5 my-8\"> \n  \r\n\n\n\n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375963\/CyberDegrees.org\/GettyImages-1128252197_39409d5ee\/GettyImages-1128252197_39409d5ee.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375963\/CyberDegrees.org\/GettyImages-1128252197_39409d5ee\/GettyImages-1128252197_39409d5ee.jpg?_i=AA 2309w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_169,c_scale\/f_auto,q_auto\/v1664375963\/CyberDegrees.org\/GettyImages-1128252197_39409d5ee\/GettyImages-1128252197-300x169.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_576,c_scale\/f_auto,q_auto\/v1664375963\/CyberDegrees.org\/GettyImages-1128252197_39409d5ee\/GettyImages-1128252197-1024x576.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_432,c_scale\/f_auto,q_auto\/v1664375963\/CyberDegrees.org\/GettyImages-1128252197_39409d5ee\/GettyImages-1128252197-768x432.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_864,c_scale\/f_auto,q_auto\/v1664375963\/CyberDegrees.org\/GettyImages-1128252197_39409d5ee\/GettyImages-1128252197-1536x864.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1152,c_scale\/f_auto,q_auto\/v1664375963\/CyberDegrees.org\/GettyImages-1128252197_39409d5ee\/GettyImages-1128252197-2048x1152.jpg?_i=AA 2048w\" sizes=\"(max-width: 2309px) 100vw, 2309px\" \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">How to Become a Security Analyst<\/h3>\n        <div class=\"text-gray-500 text-sm\"><p>This links to more detailed information about how to become a security analyst including college <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/certifications\/\">and additional certifications.<\/a><\/p>\r\n  <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/how-to-become\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n\n\n\n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669_394368191.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669_394368191.jpg?_i=AA 1999w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_225,c_scale\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669-300x225.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_768,c_scale\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669-1024x768.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_576,c_scale\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669-768x576.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1152,c_scale\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669-1536x1152.jpg?_i=AA 1536w\" sizes=\"(max-width: 1999px) 100vw, 1999px\" \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Salary and Career Outlook for Security Analysts<\/h3>\n        <div class=\"text-gray-500 text-sm\"><p>This links to a discussion of the salary expectations <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/career-and-salary\/\">and overall career outlook for security analysts.<\/a><\/p>\r\n  <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/career-and-salary\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n\n\n\n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249_39471e287.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249_39471e287.jpg?_i=AA 2121w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_200,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-300x200.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_683,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-1024x683.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_512,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-768x512.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1024,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-1536x1024.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1365,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-2048x1365.jpg?_i=AA 2048w\" sizes=\"(max-width: 2121px) 100vw, 2121px\" \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Certifications for Security Analysts<\/h3>\n        <div class=\"text-gray-500 text-sm\"><p>This links to additional information about the certifications that may be required to gain employment as a security analyst.<\/p>\r\n  <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/certifications\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n\n\n\n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448_3946ab363.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448_3946ab363.jpg?_i=AA 2120w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_200,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-300x200.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_683,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-1024x683.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_512,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-768x512.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1024,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-1536x1024.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1366,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-2048x1366.jpg?_i=AA 2048w\" sizes=\"(max-width: 2120px) 100vw, 2120px\" \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Day in the Life of a Security Analyst<\/h3>\n        <div class=\"text-gray-500 text-sm\"><p>This links to a typical <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/day-in-the-life\/\">day in the life of a security analyst<\/a> based on interviews with individuals that work in the field.<\/p>\r\n  <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/day-in-the-life\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\n<\/div>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n\r\n<h2>Frequently Asked Questions About Cybersecurity Analysts<\/h2>\r\n\r\n<h3>What does an information security analyst do?<\/h3>\r\n<p>An information security analyst monitors computer infrastructure and networks in order to protect them from threats. Their duties may encompass maintaining file access and credentials and finding weaknesses in a current system.<\/p>\r\n<h3>Are IT security jobs stressful?<\/h3>\r\n<p>The stress of the IT security job depends on the company. IT security careers can have above average stress levels and limited flexibility.<\/p>\r\n<h3>Is the role of security analyst considered an IT job?<\/h3>\r\n<p>Most security analysts work within the IT department of a company or organization.<\/p>\r\n<h3>What degree do you need to become a cybersecurity analyst?<\/h3>\r\n<p>Typically, most security analysts hold a bachelor's degree at minimum. However, some employers may seek candidates with graduate degrees or advanced certifications.<\/p>\r\n\r\n\n<section>\n\t<div class=\"text-center mb-8\">\n\t\t<sonic-tooltip class=\"block text-xs text-center mb-4\" label=\"Learn More About Our Partners\">\n\t\t\t<span>CyberDegrees.org is an advertising-supported site. Featured or trusted partner programs and all school search, finder, or match results are for schools that compensate us. This compensation does not influence our school rankings, resource guides, or other editorially-independent information published on this site.<\/span>\n\t\t<\/sonic-tooltip>\n\t<\/div>\n\t<div class=\"bootcamp-widget rounded bg-white box-border pb-10\">\n\t\t<img decoding=\"async\" loading=\"lazy\" class=\"m-auto -mt-8\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/w_120,h_82,c_fill,f_auto,fl_lossy,q_auto\/v1622734180\/BestColleges.com\/sonic\/icon-click.svg\" width=\"120\" height=\"82\" alt=\"\"\/>\n\t\t<h3 class=\"text-center text-2xl md:text-3xl font-bold mt-8 md:mt-12 mb-2 md:mb-3 px-4\">Match me with a bootcamp.<\/h3>\n\t\t<p class=\"text-center text-base mb-8 px-3\">Find programs with your skills, schedule, and goals in mind.<\/p>\n\t\t<div class=\"text-center w-full\">\n\t\t\t<a href=\"\/discover\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"sonic-btn bg-primary-800 hover:bg-primary-900 focus:bg-primary-900 uppercase mx-auto w-64 font-heading\" data-tracking=\"&#x7B;&quot;log&quot;&#x3A;true,&quot;event&quot;&#x3A;&quot;click&quot;,&quot;beam&quot;&#x3A;&quot;ElementClicked&quot;,&quot;data&quot;&#x3A;&#x7B;&quot;position&quot;&#x3A;&quot;PRIMARY&quot;,&quot;location&quot;&#x3A;&quot;BOOTCAMP&#x20;MATCH&#x20;WIDGET&quot;,&quot;elementType&quot;&#x3A;&quot;LINK&quot;,&quot;text&quot;&#x3A;&quot;MATCH&#x20;ME&#x20;TO&#x20;A&#x20;BOOTCAMP&quot;&#x7D;,&quot;actionOutcome&quot;&#x3A;&quot;INTERNALLINK&quot;&#x7D;\">Match me to a bootcamp<\/a>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h3>Reviewed by: Monali Mirel Chuatico<\/h3>\r\n\r\n<div class=\"biography flex flex-col justify-center md:justify-start md:flex-row items-center rounded-lg shadow-lg p-8 bg-white \">\n        <img decoding=\"async\" class=\"object-cover mb-8 rounded-lg max-h-60 md:mb-0\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/v1631643415\/experts\/Monali_Mirel_Chuatico.png\" alt=\"Portrait of \" height=\"240\" loading=\"lazy\">\n    <div class=\"md:ml-8\">\n    <h4 class=\"mb-1 font-bold leading-6 biography__title\"><\/h4>\n        <div class=\"mt-4 text-lg leading-6 text-gray-700 md:mb-0 md:pb-0\">\n      \r\n  <p slot=\"contentRight\">In 2019, Monali Mirel Chuatico graduated with her bachelor's in computer science, which gave her the foundation that she needed to excel in roles such as a data engineer, front-end developer, UX designer, and computer science instructor.<\/p>\r\n\r\n<p slot=\"contentRight\">Monali is currently a data engineer at Mission Lane. As a data analytics captain at a nonprofit called COOP Careers, Monali helps new grads and young professionals overcome underemployment by teaching them data analytics tools and mentoring them on their professional development journey.<\/p>\r\n\r\n<p slot=\"contentRight\">Monali Mirel Chuatico is a paid member of the Red Ventures Education freelance review network.<\/p>\r\n\n    <\/div>\n      <\/div>\n<\/div>\n\n\n\r\n\n    <\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"Interested in a career as a cybersecurity analyst? Explore our guide to security analysts, from required education and skills to daily duties and salary expectations.","protected":false},"author":5,"featured_media":2105,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[],"jobs-overview":[31],"rankings":[],"class_list":["post-34","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","jobs-overview-guide"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2105"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=34"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=34"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=34"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=34"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}