{"id":3678,"date":"2022-01-07T18:00:58","date_gmt":"2022-01-07T18:00:58","guid":{"rendered":"https:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=3678"},"modified":"2022-10-04T16:39:44","modified_gmt":"2022-10-04T16:39:44","slug":"careers-security-specialist-day-in-the-life","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/careers\/security-specialist\/day-in-the-life\/","title":{"rendered":"Day in the Life of a Security Specialist"},"content":{"rendered":"<p>Security specialists protect an organization's computer and network infrastructure. They diagnose security threats and defend systems from viruses and cyberattacks.<\/p>\r\n<p>These cybersecurity professionals repair security breach damage and suggest future improvements. They also test systems to bridge vulnerabilities and upgrade computing equipment to improve safety. <\/p>\r\n<p>According to the <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Bureau of Labor Statistics<\/a> (BLS), information security analysts earned a median annual salary of $103,590 as of 2020. The BLS projects a job growth of 33% for these professionals from 2020-2030, a much higher rate than average.<\/p>\r\n<p>This detailed guide explores what a security specialist does daily. Discover the profession's typical tasks, nonstandard duties, and expectations.<\/p>\r\n\r\n\r\n<h2>What Is a Security Specialist?<\/h2>\r\n<p>Since the birth of the internet in the 1970s, the cybersecurity field has grown exponentially. The need for security specialists rose to protect business networks from evolving cyberthreats.<\/p>\r\n<p>Security specialists &mdash; also known as cybersecurity specialists &mdash; track, analyze, and fix computer network security problems. These experts may specialize in one organization's computer and network infrastructure. They often collaborate with decision-makers to develop solutions to security threats. <\/p>\r\n<section class=\"block relative my-6\">\n  <div class=\"absolute w-2 h-full bg-secondary-700\"><\/div>\n  <div class=\"flex flex-col ml-6\">\n    Security specialists \u2014 also known as cybersecurity specialists \u2014 track, analyze, and fix computer network security problems.\n  <\/div>\n<\/section>\r\n<p>Security specialists usually work on teams with other tech professionals. They often collaborate with computer system administrators and network architects. Together, these specialists design and maintain efficient, secure systems. <\/p>\r\n<p>Cybersecurity specialists usually hold a bachelor's degree in computer science, information security, or a related field. Added certifications can help these professionals develop specialized skills and advance their careers.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/jobs\/security-specialist\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Read more about security specialists<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"job-responsibilities\" id=\"job-responsibilities\"><\/a>\n\n\r\n\r\n<h2>What Does a Security Specialist Do Daily?<\/h2>\r\n<p>Cybersecurity specialists defend and improve computer and network systems. They help government agencies, military organizations, and companies of all sizes secure their data. These specialists collaborate with other computer personnel to bolster technology systems. They also meet with executives to suggest ways to improve system security.<\/p>\r\n<p>Although their key responsibilities remain the same, a day in the life of a cybersecurity specialist may vary. One day, a security specialist might test network vulnerabilities. The next day, they might stop an active cyberthreat and install new counterattack software.<\/p>\r\n<p>Responding to cyberattacks and preparing computer systems for future prevention require adaptability. Quick thinkers with strong problem-solving skills often thrive in this role. Experienced security specialists may move into managerial positions.<\/p>\r\n<p>Staying up to date with technology and best practices can challenge security specialists. Full-time cybersecurity workers can update their knowledge and skills through certifications and continuing education.<\/p>\r\n<p>Below, discover standard and nonstandard duties for cybersecurity specialists.<\/p>\r\n\r\n<h3>Main Duties of Security Specialists<\/h3>\r\n\r\n<section class=\"checklist circle-check \">\n  \r\n<ul>\r\n<li><strong>Secure Computer and Network Systems:<\/strong> Cybersecurity specialists monitor computer systems and respond to potential threats. They also define privileges to prevent unauthorized system access. Daily tasks for this role, like penetration testing, reporting, and system upgrading, support the overarching goal of network security. <\/li>\r\n<li><strong>Identify Vulnerabilities:<\/strong> Security specialists use penetration testing to identify security vulnerabilities. They use their findings to design and install upgrades and software to prevent future cyberthreats.<\/li>\r\n<li><strong>Respond to Active Threats:<\/strong> When active cyberthreats happen, security specialists provide a front-line response. Their specialized knowledge helps them block unauthorized access and create workable solutions. They also log data about the danger to enhance trend reporting and future prevention tactics. <\/li>\r\n<li><strong>Install Prevention Software:<\/strong> Security specialists install upgrades and software designed to prevent attacks. These specialists may work with an IT team to create proprietary software that targets a specific vulnerability.<\/li>\r\n<li><strong>Report Findings:<\/strong> Cybersecurity specialists report their test findings and security procedures to their points of contact. These reports detail attempts to secure systems and test weak points. The specialist may also use their report data to offer solutions for system improvement. <\/li>\r\n<\/ul>\r\n\n<\/section>\n\n\r\n\r\n<h3>Nonstandard Duties for Security Specialists <\/h3>\r\n<section class=\"checklist circle-check \">\n  \r\n<ul>\r\n<li><strong>Establish Security Teams:<\/strong> Large organizations sometimes often employ network and operational security teams. A cybersecurity specialist with leadership experience may recruit, train, and manage these teams.<\/li>\r\n<li><strong>Periodic Security Audits:<\/strong> Cybersecurity specialists complete occasional in-depth security audits. Specialists may examine in-house security issues like access privileges and potential violations. Other audits might cover vulnerabilities in consumer data storage or external data transfer.<\/li>\r\n<li><strong>Software and Hardware Development:<\/strong> Security specialists sometimes work with software and hardware development teams to track product security. These parties collaborate to design and install software and hardware that meets an organization's data protection needs. <\/li>\r\n<li><strong>Professional Development:<\/strong> Security specialists might pursue professional development depending on their position and company. They may attend workshops, seminars, and certification programs. These opportunities can boost a professional's knowledge of critical security topics and new research. Cybersecurity specialists may also continue their education through degree programs. <\/li>\r\n<li><strong>Suggest Security Improvements:<\/strong> Computer system upgrades allow organizations to adapt to new technologies and security threats. A cybersecurity specialist may suggest security improvements based on analytics and testing results. These suggestions often happen during scheduled meetings with decision-makers. <\/li>\r\n<\/ul>\r\n\n<\/section>\n\n\r\n\r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"stacked\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"typical-day\" id=\"typical-day\"><\/a>\n\n\r\n\r\n<h2>What Is it Like to be a Security Specialist?<\/h2>\r\n<p>A security specialist's job description includes analyzing computer security vulnerabilities, reporting findings, and implementing new security measures. Career security specialists work closely with other technology personnel like IT support specialists and network administrators.<\/p>\r\n<section class=\"block relative my-6\">\n  <div class=\"absolute w-2 h-full bg-secondary-700\"><\/div>\n  <div class=\"flex flex-col ml-6\">\n    A security specialist's job description includes analyzing computer security vulnerabilities, reporting findings, and implementing new security measures.\n  <\/div>\n<\/section>\r\n<p>What is it like to be a security specialist? Here's an example of what a typical day might look like:<\/p>\r\n\r\n<ul>\r\n<li>Log into a security dashboard to review overnight analytics.<\/li>\r\n<li>Complete penetration testing to identify potential weak points.<\/li>\r\n<li>Respond to any reported threats and vulnerabilities.<\/li>\r\n<li>Oversee technical teams to monitor security procedures.<\/li>\r\n<li>Attend a meeting with <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/chief-information-security-officer-ciso\/\">chief information security officers<\/a> and hardware engineers to suggest a hardware upgrade.<\/li>\r\n<li>Install and set up new software for cloud security.<\/li>\r\n<\/ul>\r\n\r\n<p>A day in the life of a security specialist often varies, especially when new cyberthreats happen. Security specialists must halt emerging threats quickly and protect against them in the future.<\/p>\r\n<p>These <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\" title=\"jobs\" data-wpil-keyword-link=\"linked\">jobs<\/a> do not always run on a 9-5 schedule. Sometimes, cybersecurity specialists must work overtime to react to security threats or track vulnerabilities found through testing or analytics. Professional training may also happen outside of typical work hours. <\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"where-security-specialists-work\" id=\"where-security-specialists-work\"><\/a>\n\n\r\n\r\n<h2>Where Security Specialists Work<\/h2>\r\n<p>Government and corporate settings typically employ security specialists. General duties remain the same across most industries. However, government agencies may require specialized knowledge and different security levels than corporate employers.<\/p>\r\n<p>Technology companies employ <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm\" target=\"_blank\" rel=\"noopener noreferrer\">the highest number<\/a> of information security specialists. Business management, credit-related services, and technical consultant services are also top-hiring industries. Other major employers include insurance, data processing, telecommunications, and online retail. <\/p>\r\n<section class=\"block relative my-6\">\n  <div class=\"absolute w-2 h-full bg-secondary-700\"><\/div>\n  <div class=\"flex flex-col ml-6\">\n    According to BLS data, Virginia employs the most information security analysts, with 16,160 positions as of 2020.\n  <\/div>\n<\/section>\r\n<p>Cybersecurity specialists can find work across the United States. However, some states offer higher employment than others. According to <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151212.htm#st\" target=\"_blank\" rel=\"noopener noreferrer\">BLS data<\/a>, Virginia employs the most information security analysts, with 16,160 positions as of 2020. Texas, California, and Florida follow. <\/p>\r\n<p>A tech-forward state, Virginia boasts the country's highest concentration of tech workers. Other states employing cybersecurity specialists, like Texas and California, also nurture bustling tech economies. Metropolitan areas known for their tech industries, like Washington, D.C., and Newark, New Jersey, provide work for thousands of security specialists. Rural areas may offer fewer opportunities for these tech-driven jobs. <\/p>\r\n<p>Security specialists should expect lower wages in states with less demand. For example, Mississippi employed 440 information security analysts as of 2020. These workers earned an average annual salary of $74,360. On the other hand, security specialists in Virginia and California &mdash; states with high demand for the profession &mdash; earned average annual salaries of $116,920 and $125,990, respectively.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/careers\/security-specialist\/career-and-salary\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">See how location affects salary for security specialists<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"become-a-security-specialist\" id=\"become-a-security-specialist\"><\/a>\n\n\r\n\r\n<h2>Should You Become a Security Specialist? <\/h2>\r\n<p>People interested in a cybersecurity career may appreciate the industry's high salary potential and fast pace. Most days on the job vary, as computer systems need constant fine-tuning to prevent cyberthreats. Security specialists must adapt to frequent changes.<\/p>\r\n<p>In contrast, people who prefer a more predictable workday may find a day in the life of a cybersecurity specialist too dynamic. <\/p>\r\n<p>The path to becoming a security specialist is also important to consider. Most security specialists can enter the field with a bachelor's degree. Still, professionals may need to pursue more certifications, education, or training to meet a company's specific needs. This process takes time and money.<\/p>\r\n<p>Cybersecurity careers can lead to advanced opportunities as workers gain experience. Potential jobs with higher earning potential include chief security officer and computer systems manager. <\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/careers\/security-specialist\/how-to-become\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover how to become a security specialist<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<h3>How to Prepare for a Career as a Security Specialist<\/h3>\r\n<p>Organizations trust security specialists to protect their computer and network systems. Therefore, employers look for candidates with relevant, specialized skills and educational backgrounds. <\/p>\r\n<p>Explore accredited cybersecurity degrees that develop practical skills through hands-on projects. Programs should feature current tools and languages and offer a collaborative environment. A concentration like vulnerability management or security management may help you reach your goals.<\/p>\r\n<p><a href=\"\/resources\/certifications\/\">Cybersecurity certifications<\/a> can help job applicants stand out. However, certification programs require time and dedication. These commitments can take a mental toll on professionals with full-time jobs. <\/p>\r\n<p>Many certification programs offer self-study options or evening and weekend training to fit around your work schedule. Look for study programs to help you understand key concepts and practice exams to prepare you for certification tests.<\/p>\r\n\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n            <div class=\"mb-12\">\n                      <h2 class=\"heading-1 mb-8\">Learn More About Security Specialists<\/h2>\n          \n                  <\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/Cyber_Jobs_Security-Specialist-425x230-c-default.jpg\"\n        alt=\"What Is a Security Specialist?\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">What Is a Security Specialist?<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\">What does a security specialist do daily? This guide details the profession's daily responsibilities, necessary skills, and potential career paths.<\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-specialist\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2022\/01\/Cyber_Careers_Security-Specialist_How-to-become-425x230-c-default.jpg\"\n        alt=\"How to Become a Security Specialist\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">How to Become a Security Specialist<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\">People can take different paths to a cybersecurity specialist career. Discover the steps to <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-specialist\/how-to-become\/\">become a security specialist<\/a>, including education and work experience. <\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-specialist\/how-to-become\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2022\/01\/Cyber_Careers_Security-Specialist_Salary-425x230-c-default.jpg\"\n        alt=\"Salary and Career Outlook for Security Specialists\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Salary and Career Outlook for Security Specialists<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-specialist\/career-and-salary\/\">Cybersecurity professionals like security specialists enjoy a promising job outlook and salary<\/a> potential. Use this guide to learn what you can expect from the career.<\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-specialist\/career-and-salary\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2022\/01\/Cyber_Careers_Security-Specialist_Certifications-425x230-c-default.jpg\"\n        alt=\"Security Specialist Certifications\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Security Specialist Certifications<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\">The right certifications can advance a <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-specialist\/\">security specialist's career<\/a>. Explore in-demand certifications with this detailed guide.<\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-specialist\/certifications\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n\r\n<h2>Frequently Asked Questions About Cybersecurity Specialists<\/h2>\r\n\r\n<h3>What is the job description of a security specialist?<\/h3>\r\n<p>Security specialists protect an organization's computer systems from cyberattacks and vulnerabilities. These cybersecurity experts track, test, and improve system security. They also suggest solutions to company decision-makers.<\/p>\r\n<h3>Is a day in the life of a cybersecurity professional stressful?<\/h3>\r\n<p>A security specialist's work day can be stressful, especially when an active threat is in progress. Cybersecurity specialists must curb threats quickly. Quick thinking and adaptability are crucial. Sometimes, these professionals must work extra hours to manage a threat.<\/p>\r\n<h3>What skills do you need to have a career as a security specialist?<\/h3>\r\n<p>Security specialists need in-depth computing and programming mastery. Their jobs demand strong critical thinking and problem-solving abilities. Written and oral communications skills can also help when providing solutions and summaries to executives. <\/p>\r\n<h3>How many hours does a security specialist work?<\/h3>\r\n<p>Most security professionals work a full-time, 40-hour weekly schedule. However, the job's ever-changing demands sometimes call for more hours to complete an upgrade or curb a cyberattack.<\/p>","protected":false},"excerpt":{"rendered":"What does a security specialist do daily? Learn about cybersecurity specialists&#8217; typical duties, and hear from a professional in the field.","protected":false},"author":29,"featured_media":3680,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-3678","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/3678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=3678"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/3678\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/3680"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=3678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=3678"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=3678"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=3678"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=3678"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=3678"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=3678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}