{"id":3952,"date":"2022-03-01T18:16:14","date_gmt":"2022-03-01T18:16:14","guid":{"rendered":"https:\/\/www.cyberdegrees.org\/?p=3952"},"modified":"2022-10-06T14:23:22","modified_gmt":"2022-10-06T14:23:22","slug":"how-to-become-a-security-analyst","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/how-to-become\/","title":{"rendered":"How to Become a Security Analyst"},"content":{"rendered":"<div class=\"pullquote inline-block text-xl font-bold \npullquote--border-top\npullquote--placement pullquote--placement-center\">\n    <p>\r\n<p>Of the 1.65 million cybersecurity <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\"  title=\"jobs\" data-wpil-keyword-link=\"linked\">jobs<\/a> in the U.S, nearly 600,000 remain unfilled.<\/p>\r\n<\/p>\n<\/div>\n\n\r\n\r\n<p>Information security analysts help organizations anticipate, avoid, and recover from cybersecurity attacks. These tech professionals work in a growing and rewarding field.<\/p>\r\n\r\n<p>Of the 1.65 million cybersecurity <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\"  title=\"jobs\" data-wpil-keyword-link=\"linked\">jobs<\/a> in the U.S, <a href=\"https:\/\/www.cyberseek.org\/heatmap.html\" target=\"_blank\" rel=\"noopener\">nearly 600,000<\/a> remain unfilled. According to the U.S. <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">Bureau of Labor Statistics<\/a> (BLS), these professionals earn a median annual salary of $103,590. Information security analysts play a critical role on a cybersecurity team.<\/p>\r\n\r\n<p>Becoming a security analyst typically requires a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-cyber-security-bachelors-degrees\/\">bachelor's degree in cybersecurity<\/a> or a related field. Aspiring information security professionals with degrees in other fields may pursue bootcamps or other alternative paths. Most security analysts hold one or more certifications in the industry alongside their degrees.<\/p>\r\n\r\n<p>This page takes an in-depth look at how to become a security analyst.<\/p>\r\n\r\n<h2>What Is a Security Analyst?<\/h2>\r\n\r\n<p>Information security analysts plan, execute, and manage security solutions. Their mission is to anticipate and avoid cybersecurity attacks.<\/p>\r\n\r\n<p>Security analysts use information from <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/penetration-tester\/\">penetration testers<\/a> to improve company security policies. They also review data from previous breaches to strengthen their organization's security tools and networks. Analysts must research current cybersecurity trends, develop security standards, review current tools and procedures, and recommend security enhancements.<\/p>\r\n\r\n<p>Security analysts work in information technology departments. They may interact with penetration testers, project managers, computer network administrators, and other technology and management specialists.<\/p>\r\n\r\n<p>These professionals can work for companies, banks, hospitals, nonprofit organizations, or government agencies. They often report to information security managers or  <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/chief-information-security-officer-ciso\/\" target=\"_blank\" rel=\"noopener\">chief information security officers<\/a>.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Read more about security analysts<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"requirements\" id=\"requirements\"><\/a>\n\n\r\n<h2>Education Requirements for Security Analysts<\/h2>\r\n\r\n<p>Security analysts typically need a bachelor's degree to get started in the field. Some employers also expect these professionals to complete <a href=\"https:\/\/www.cyberdegrees.org\/resources\/certifications\/\">security certifications<\/a> or a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/masters-degrees\/\">master's degree in cybersecurity<\/a>.<\/p>\r\n\r\n<p>Prospective information security analysts may already hold a bachelor's degree in another field. These learners might consider a <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-cyber-security-bootcamps\/\">cybersecurity bootcamp<\/a> to supplement their existing degrees. Shorter programs that provide skills-focused training, bootcamps do not involve the same academic requirements as a college or university.<\/p>\r\n\r\n<p>Whether they choose a bootcamp or a degree, most security professionals need to earn certification. Some degrees include certification as part of their curriculum. Many bootcamps train students to pass certification exams. Industry-related associations also confer certifications, often requiring students to pass rigorous exams.<\/p>\r\n\r\n<p>Earning advanced degrees can help information security analysts become <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-engineer\/\">security engineers<\/a>, networking directors, or chief information security officers. Students who aspire to do research, teach, or influence information security policy need a master's degree or doctorate.<\/p>\r\n\r\n<p>A master's in cybersecurity usually focuses on <a href=\"https:\/\/www.cyberdegrees.org\/resources\/hot-technologies-cyber-security\/\">advanced technology<\/a> and the larger cybersecurity environment. A doctorate requires original research. This degree trains students to expand the frontiers of knowledge in the discipline.<\/p>\r\n\r\n<p>Cybersecurity professionals with a certificate or associate may want to look into a four-year program or bootcamp if they plan to advance professionally.<\/p>\r\n\r\n<h3>Explore Your Degree Options<\/h3>\r\n\r\n<ul class=\"ssr-columns grid md:grid-cols-2 gap-3 \">\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/associate-degrees\/\" target=\"_blank\" rel=\"noopener\">Associate in Cybersecurity Programs<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/bachelors-degrees\/\" target=\"_blank\" rel=\"noopener\">Bachelor\u2019s in Cybersecurity Programs<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-online-cyber-security-bachelors-degrees\/\" target=\"_blank\" rel=\"noopener\">Best Online Bachelor\u2019s in Cybersecurity Programs<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/masters-degrees\/\" target=\"_blank\" rel=\"noopener\">Master's in Cybersecurity Programs<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/top-online-masters-in-cyber-security-programs\/\" target=\"_blank\" rel=\"noopener\">Best Online Master\u2019s in Cybersecurity Programs<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/doctorate-degrees-online\/\" target=\"_blank\" rel=\"noopener\">Online Doctorates in Cybersecurity<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/certificate-programs\/\" target=\"_blank\" rel=\"noopener\">Certificate Programs in Cybersecurity<\/a><\/li>\r\n<li><a href=\"https:\/\/www.cyberdegrees.org\/listings\/cyber-security-bootcamps\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Bootcamps<\/a><\/li>\r\n<\/ul>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n  <section\n    class=\"relative py-3 md:py-16 my-10\"\n    data-preamp=\"editorial-listings\"\n    data-options=\n    data-tracking=\n    data-cy=\"editorial-listings-grid\"\n    \n  >\n    <div class=\"bg-full-width absolute border-t border-b border-gray-100 top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n\n    \n        <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n    \n        <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    \n    <sonic-editorial-listings\n      \n      \n      \n      limit=\"4\"\n      layout=\"grid\"\n    ><\/sonic-editorial-listings>\n\n  <\/section>\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h2>Required Job Experience for Security Analysts<\/h2>\r\n\r\n<p>Information security analysts often need experience in a related field. Experience helps determine salary as well. According to <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Information_Security_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale data from February 2022<\/a>, information security analysts with 20-plus years of experience earn 45% more than the average annual salary for all security analysts.<\/p>\r\n\r\n<p>Industry certifications, often required for security roles, may also call for previous experience. For example, the certified information systems security professional (CISSP) requires a cumulative five years of paid work experience in the field. For this credential, a four-year degree only counts as one year of work experience.<\/p>\r\n\r\n<p>In many cases, education cannot replace job experience. Some academic programs include internships or other real-world opportunities. Though limited, these experiences can offer hands-on learning and new network connections for entry-level workers.<\/p>\r\n\r\n<h3>Internship Opportunities<\/h3>\r\n\r\n<p>Universities may require cybersecurity students to complete an internship. An internship is a temporary, supervised position that teaches practical skills in a real-world setting. Specifics vary, but a three-credit internship could entail 120 work hours. Students may conclude with a written journal or evaluation of the experience.<\/p>\r\n\r\n<p>Supervisors usually evaluate student interns, which may help determine their grades. Learners often need department approval before starting an internship.<\/p> \r\n\r\n<p>Students can undertake paid or unpaid internships in workplaces such as:<\/p>\r\n\r\n<ul style=\"list-style-type:none;\">\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>IBM<\/li>\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>Lockheed Martin<\/li>\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>Facebook<\/li>\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>Palo Alto Networks<\/li>\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>Department of Homeland Security<\/li>\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>Cybersecurity and Infrastructure Security Agency<\/li>\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>National Security Agency<\/li>\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>Central Intelligence Agency<\/li>\r\n<li><sonic-icon icon=\"check-circle\" color=\"#12C7C4\"><\/sonic-icon>Federal Bureau of Investigation<\/li>\r\n<\/ul> \r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"certification-requirements\" id=\"certification-requirements\"><\/a>\n\n\r\n<h2>Certification Requirements for Security Analysts<\/h2>\r\n\r\n<div class=\"pullquote inline-block text-xl font-bold \npullquote--border-top\npullquote--placement pullquote--placement-center\">\n    <p>\r\n<p>In Fortinet's 2020 survey, 82% of organizations said they preferred cybersecurity job candidates with at least one certification.<\/p>\r\n<\/p>\n<\/div>\n\n\r\n\r\n<p>At some point in their careers, cybersecurity professionals may need to pursue certification. These credentials can help professionals earn higher salaries or pursue career advancement opportunities.<\/p>\r\n\r\n<p><a href=\"https:\/\/www.fortinet.com\/content\/dam\/maindam\/PUBLIC\/02_MARKETING\/08_Report\/report-fortinet-survey-skills-shortage.pdf\" target=\"_blank\" rel=\"noopener\">In Fortinet's 2020 survey<\/a>, 82% of organizations said they preferred cybersecurity job candidates with at least one certification. Over half of organizations said cybersecurity certifications validate a candidate's awareness and knowledge. Of professionals who held certification, 94% claimed it improved their skills and knowledge.<\/p>\r\n\r\n<p>Unlike <a href=\"https:\/\/www.cyberdegrees.org\/listings\/certificate-programs\/\">cybersecurity certificate programs<\/a> offered through colleges or universities, certifications come from reputable third-party companies and associations. Certifications usually require an exam and may also call for significant professional experience. Popular industry certifications include:<\/p>\r\n\r\n<ul>\r\n<li>Certified information systems security professional (CISSP), a fundamental industry certification<\/li>\r\n<li>Certified information systems auditor, which serves assessors in particular<\/li>\r\n<li>Security+, which covers core functionalities<\/li>\r\n<li>Certified ethical hacker, especially for <a href=\"https:\/\/www.cyberdegrees.org\/careers\/penetration-tester\/day-in-the-life\/\">penetration testers<\/a><\/li>\r\n<\/ul>\r\n\r\n<p>Bootcamps and degrees may prepare students to earn industry certifications. Some academic programs even incorporate industry certifications into their curricula. Most certification-holders must maintain their credential through continuing education credits and annual fees.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/certifications\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about certifications for security analysts<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/certifications\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore additional certifications for cybersecurity experts<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n<h2>How to Get Started on a Security Analyst Career Path<\/h2>\r\n \r\n<p>A <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/career-and-salary\/\">security analyst career<\/a> path usually contains four steps: research, education, experience, and certification. The specific journey differs from person to person, however.<\/p> \r\n\r\n<p>For instance, a high school graduate may complete the education step with a bachelor's degree in cybersecurity or a related field. By contrast, a student who already holds a bachelor's degree may choose a bootcamp instead.<\/p>\r\n\r\n<p>It may take 4-6 years for a security worker to complete their education and certification requirements before entering the field. Job-seekers who already have education and experience might need just a few months of bootcamp.<\/p> \r\n\r\n<p>Certifications may be part of the educational experience, or students may pursue these credentials independently. Consider each step of the security analyst career path in more detail:<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"steps\" id=\"steps\"><\/a>\n\n\r\n<h3>Steps to Becoming a Security Analyst<\/h3>\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ol class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex flex-col list-none\">\n    <div class=\"flex items-center\">\n        <div class=\"bg-primary-700 w-6 h-6 absolute flex justify-center items-center rounded-full -ml-2 mr-4\">\n            <span class=\"heading-4 font-bold text-white\">1<\/span>\n        <\/div>\n        <div class=\"ml-6\">\n            <h4 class=\"font-bold heading-4 text-gray-900\">Research<\/h4>\n        <\/div>\n    <\/div>\n    <div class=\"ml-6 text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Research\" data-layout=\"numbered\" data-number=\"1\" data-text=\"small\">\r\n<p>Prospective cybersecurity professionals should thoroughly research any training program before enrolling. Books, blogs, podcasts, online courses, and community colleges can all help students master the basics.<\/p> \r\n\r\n<p>With this knowledge, students may maximize their educational experience. Research can also assist students who are mapping their certification options.<\/p>\r\n<\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex flex-col list-none\">\n    <div class=\"flex items-center\">\n        <div class=\"bg-primary-700 w-6 h-6 absolute flex justify-center items-center rounded-full -ml-2 mr-4\">\n            <span class=\"heading-4 font-bold text-white\">2<\/span>\n        <\/div>\n        <div class=\"ml-6\">\n            <h4 class=\"font-bold heading-4 text-gray-900\">Education<\/h4>\n        <\/div>\n    <\/div>\n    <div class=\"ml-6 text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Education\" data-layout=\"numbered\" data-number=\"2\" data-text=\"small\">\r\n<p>Security analyst education requirements typically include a bachelor's degree. Students may major in computer science, cybersecurity, engineering, or math.<\/p> \r\n\r\n<p>Some employers accept a bootcamp experience instead of a four-year degree in cybersecurity. Many bootcamp enrollees already hold a bachelor's degree in another subject.<\/p>\r\n<\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex flex-col list-none\">\n    <div class=\"flex items-center\">\n        <div class=\"bg-primary-700 w-6 h-6 absolute flex justify-center items-center rounded-full -ml-2 mr-4\">\n            <span class=\"heading-4 font-bold text-white\">3<\/span>\n        <\/div>\n        <div class=\"ml-6\">\n            <h4 class=\"font-bold heading-4 text-gray-900\">Experience<\/h4>\n        <\/div>\n    <\/div>\n    <div class=\"ml-6 text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Experience\" data-layout=\"numbered\" data-number=\"3\" data-text=\"small\">\r\n<p>On-the-job experience can help students practice their skills in real-world settings.<\/p> \r\n\r\n<p>Experience may come through an internship, an entry-level job, or freelance work. Jobs in business and technology-related fields may give candidates a leg up in information security.<\/p>\r\n<\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex flex-col list-none\">\n    <div class=\"flex items-center\">\n        <div class=\"bg-primary-700 w-6 h-6 absolute flex justify-center items-center rounded-full -ml-2 mr-4\">\n            <span class=\"heading-4 font-bold text-white\">4<\/span>\n        <\/div>\n        <div class=\"ml-6\">\n            <h4 class=\"font-bold heading-4 text-gray-900\">Certification<\/h4>\n        <\/div>\n    <\/div>\n    <div class=\"ml-6 text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Certification\" data-layout=\"numbered\" data-number=\"4\" data-text=\"small\">\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/certifications\/\">Certification is a<\/a> typical job requirement for security analysts. Credentials, such as CISSP, help job-seekers apply general knowledge to specific areas of cybersecurity. Employers may rely on certifications to determine an applicant's readiness for cybersecurity work.<\/p>\r\n<\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex flex-col list-none\">\n    <div class=\"flex items-center\">\n        <div class=\"bg-primary-700 w-6 h-6 absolute flex justify-center items-center rounded-full -ml-2 mr-4\">\n            <span class=\"heading-4 font-bold text-white\">5<\/span>\n        <\/div>\n        <div class=\"ml-6\">\n            <h4 class=\"font-bold heading-4 text-gray-900\">Advanced Education<\/h4>\n        <\/div>\n    <\/div>\n    <div class=\"ml-6 text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Advanced Education\" data-layout=\"numbered\" data-number=\"5\" data-text=\"small\">\r\n<p>More education marks the last step on the security analyst career path.<\/p> \r\n\r\n<p>Earning a <a href=\"https:\/\/cyberdegrees.org\/listings\/business-and-technology-concentrations\/best-programs\/\">master of business administration<\/a>, a master of science in cybersecurity, or another graduate degree can position professionals for leadership roles. These programs often expose students to the wider technological, legal, ethical, and moral landscape of cybersecurity.<\/p>\r\n<\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n<h3>Is a Security Analyst Job Right for Me?<\/h3>\r\n\r\n<p>Security professionals can expect above-average salaries and faster-than-average job growth rates, <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">according to the BLS<\/a>. Still, the road to this career is not easy, requiring students to learn relevant computer languages, tools, techniques, policies, and laws.<\/p>\r\n\r\n<p>Problem-solvers and quick learners with analytical minds may develop a passion for information security. Let us take a look at the pros and cons of this career path:<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<sonic-callout theme=\"primary-light\">\r\n<h3 align=\"center\">Pros<\/h3>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-4 text-gray-900\">Income<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Income\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"small\">\r\n    <p>Information security specialists can earn more than $100,000 a year in median annual salary.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-4 text-gray-900\">Job Opportunities<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Job Opportunities\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"small\">\r\n    <p>This field is growing much faster than the average career.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-4 text-gray-900\">Self-Employment Options<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Self-Employment Options\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"small\">\r\n    <p>Security specialists <a href=\"https:\/\/www.cyberdegrees.org\/careers\/security-consultant\/how-to-become\/\">can become independent consultants<\/a>.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#0097A7\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-4 text-gray-900\">Lifelong Learning<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Lifelong Learning\" data-icon=\"check-circle\" data-color=\"#0097A7\" data-text=\"small\">\r\n    <p>Cybersecurity professionals never stop learning.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n<\/sonic-callout>\r\n\r\n<sonic-callout theme=\"secondary-light\">\r\n<h3 align=\"center\">Cons<\/h3>\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#AA4A44\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-4 text-gray-900\">Demanding Hours<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Demanding Hours\" data-icon=\"check-circle\" data-color=\"#AA4A44\" data-text=\"small\">\r\n    <p>Cybersecurity professionals may have to deal with after-hours emergencies.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#AA4A44\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-4 text-gray-900\">Repetitive Tasks<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Repetitive Tasks\" data-icon=\"check-circle\" data-color=\"#AA4A44\" data-text=\"small\">\r\n    <p>Checking files and documentation might become monotonous.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#AA4A44\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-4 text-gray-900\">High-Pressure Jobs<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"High-Pressure Jobs\" data-icon=\"check-circle\" data-color=\"#AA4A44\" data-text=\"small\">\r\n    <p>Corporate reputations and large amounts of money often depend on cybersecurity.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#AA4A44\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div>\n        <h4 class=\"font-bold heading-4 text-gray-900\">Lack of Resources<\/h4>\n        <div class=\"text-gray-700 text-base\"><section class=\"checklist-item\" data-title=\"Lack of Resources\" data-icon=\"check-circle\" data-color=\"#AA4A44\" data-text=\"small\">\r\n    <p>The field changes rapidly. Companies may not offer everything needed to stay abreast of new threats.<\/p>\r\n  <\/section><\/div>\n    <\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n<\/sonic-callout>\r\n\n<\/div>\n\r\n\r\n<p style=\"text-align: right\"><strong>Source:<\/strong> <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">BLS<\/a><\/p>\r\n\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/career-and-salary\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">See how location affects salary for security analysts<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/day-in-the-life\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">What does a typical day for a security analyst look like?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"hunt\" id=\"hunt\"><\/a>\n\n\r\n<h3>The Job Hunt<\/h3>\r\n\r\n<p>With 600,000 cybersecurity jobs going unfilled, finding the right role can take time and effort.<\/p>\r\n\r\n<p>Aspiring security analysts must know how to craft a resume, identify job leads, and conduct interviews.<\/p>\r\n\r\n<p>Cybersecurity professionals can turn to a variety of resources to prepare for the application process. These resources include job fairs, mentor recommendations, professional organizations, and networking opportunities through annual conferences. The <a href=\"https:\/\/www.blackhat.com\/upcoming.html\" target=\"_blank\" rel=\"noopener\">Black Hat<\/a> and <a href=\"https:\/\/www.rsaconference.com\/en\" target=\"_blank\" rel=\"noopener\">RSA conferences<\/a> are two of the largest cybersecurity events in the country.<\/p>\r\n\r\n<p>Job boards can also provide information, insight, and opportunities for cybersecurity career candidates. The list below introduces five of the most popular cybersecurity job boards.<\/p>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/www.indeed.com\/\" title=\"Indeed\" target=\"_blank\" theme=\"accent\">\r\n<p>Home of 175 million resumes, Indeed is one of the largest job search sites on the web. Job-seekers can run searches, read articles, learn about companies, and discover salary information.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/infosec-jobs.com\/\" title=\"Infosec-Jobs.Com\" target=\"_blank\" theme=\"accent\">\r\n<p>Job-seekers can search for open positions or sign up for job announcement emails. The site also offers information on salaries and careers in the field.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/www.dice.com\/\" title=\"Dice\" target=\"_blank\" theme=\"accent\">\r\n<p>A marketplace for career technologists, Dice offers a job board, career development resources, and resources for job-seekers. Users can search through job ads and post their resumes on the site.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/careers-cisecurity.icims.com\/jobs\/search?hashed=-626009842&mobile=false&width=1492&height=500&bga=true&needsRedirect=false&jan1offset=-300&jun1offset=-240\" title=\"CIS Job Board\" target=\"_blank\" theme=\"accent\">\r\n<p>The Center for Internet Security maintains this job board, which allows candidates to search by keyword. The platform also allows job-seekers to apply directly to positions of interest.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n<sonic-resource-list titleLink=\"https:\/\/issa-jobs.careerwebsite.com\/jobs\/\" title=\"ISSA Job Board\" target=\"_blank\" theme=\"accent\">\r\n<p>Sponsored by the Information Systems Security Association, this board lets job-seekers search by title and location. Users can filter results by industry and job function as well.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n\r\n<h2>Resources for Future Security Analysts<\/h2>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-4 gap-5 my-8\"> \n  \r\n\n\n\n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1093461000.jpg\"\n      loading=\"lazy\"\n      alt=\"1\"\n    \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">What Is a Security Analyst?<\/h3>\n        <div class=\"text-gray-500 text-sm\"><p>Learn what a security analyst does, how much they earn, and how to become one. This page covers the major employers, industries, and degrees relevant to security analysts.<\/p>\r\n  <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n\n\n\n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669_394368191.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669_394368191.jpg?_i=AA 1999w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_225,c_scale\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669-300x225.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_768,c_scale\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669-1024x768.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_576,c_scale\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669-768x576.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1152,c_scale\/f_auto,q_auto\/v1664375959\/CyberDegrees.org\/GettyImages-580501669_394368191\/GettyImages-580501669-1536x1152.jpg?_i=AA 1536w\" sizes=\"(max-width: 1999px) 100vw, 1999px\" \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Salary and Career Outlook for Security Analysts<\/h3>\n        <div class=\"text-gray-500 text-sm\"><p>Discover how much security analysts can earn and how education and experience affect their salary. Also, learn where the best-paying jobs are located.<\/p>\r\n  <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/career-and-salary\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n\n\n\n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249_39471e287.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249_39471e287.jpg?_i=AA 2121w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_200,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-300x200.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_683,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-1024x683.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_512,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-768x512.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1024,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-1536x1024.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1365,c_scale\/f_auto,q_auto\/v1664375953\/CyberDegrees.org\/GettyImages-164844249_39471e287\/GettyImages-164844249-2048x1365.jpg?_i=AA 2048w\" sizes=\"(max-width: 2121px) 100vw, 2121px\" \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Certifications for Security Analysts<\/h3>\n        <div class=\"text-gray-500 text-sm\"><p>Learn more about the cybersecurity certifications required for many security analyst positions. This page offers information about which certification to pursue and how to prepare.<\/p>\r\n  <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/certifications\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\r\n\n\n\n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448_3946ab363.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n srcset=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448_3946ab363.jpg?_i=AA 2120w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_300,h_200,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-300x200.jpg?_i=AA 300w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1024,h_683,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-1024x683.jpg?_i=AA 1024w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_768,h_512,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-768x512.jpg?_i=AA 768w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_1536,h_1024,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-1536x1024.jpg?_i=AA 1536w, https:\/\/res.cloudinary.com\/highereducation\/images\/w_2048,h_1366,c_scale\/f_auto,q_auto\/v1664375956\/CyberDegrees.org\/GettyImages-1327443448_3946ab363\/GettyImages-1327443448-2048x1366.jpg?_i=AA 2048w\" sizes=\"(max-width: 2120px) 100vw, 2120px\" \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Day in the Life of a Security Analyst<\/h3>\n        <div class=\"text-gray-500 text-sm\"><p>Find out what a security analyst does, including their major duties, where they work, and how to get started in the field.<\/p>\r\n  <\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/careers\/security-analyst\/day-in-the-life\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\n<\/div>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n<h2>Frequently Asked Questions About Security Analysts<\/h2>\r\n\r\n<h3>What degree do I need to become a security analyst?<\/h3>\r\n<p>Most jobs require a bachelor's degree and cybersecurity certification. However, security analyst education requirements vary from company to company. Majoring in cybersecurity or computer science can help prepare future security analysts.<\/p>\r\n\r\n<h3>Can I learn how to be a security analyst without a degree?<\/h3>\r\n<p>Some employers may accept a bootcamp or certification instead of a college degree. However, the <a href=\"https:\/\/www.bls.gov\/emp\/tables\/educational-attainment.htm\" target=\"_blank\" rel=\"noopener\">BLS reports<\/a> 42.8% of information security analysts hold a bachelor's degree and 25.7% hold a graduate degree.<\/p>\r\n\r\n<h3>How long does it take to become an information security analyst?<\/h3>\r\n<p>For most information security analysts, the career path takes 4-6 years. These professionals typically complete a four-year degree and build skills in cloud security, threat hunting, and threat intelligence. They may need several certifications, including CompTIA Security+.<\/p>\r\n\r\n<h3>Is the field of cybersecurity hard to get into?<\/h3>\r\n<p>Not if you complete the required education and experience. Nearly 600,000 cybersecurity jobs remain unfilled in the United States. A bootcamp or postsecondary degree can help students learn security fundamentals. Senior-level positions may call for additional education and experience.<\/p>","protected":false},"excerpt":{"rendered":"Interested in a security analyst career? Read on to learn about the steps to becoming a security analyst, including required education and experience.","protected":false},"author":45,"featured_media":3940,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-3952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/3952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=3952"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/3952\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/3940"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=3952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=3952"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=3952"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=3952"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=3952"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=3952"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=3952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}