{"id":6273,"date":"2022-03-03T17:57:59","date_gmt":"2022-03-03T17:57:59","guid":{"rendered":"https:\/\/www.computerscience.org\/?p=6273"},"modified":"2024-08-21T16:17:17","modified_gmt":"2024-08-21T16:17:17","slug":"how-to-become-an-information-security-analyst","status":"publish","type":"post","link":"https:\/\/www.computerscience.org\/careers\/cybersecurity\/information-security-analyst\/how-to-become\/","title":{"rendered":"How to Become an Information Security Analyst"},"content":{"rendered":"<p>Ever wondered what a day in the life of a cyber security analyst is like? Now is an excellent time to enter the growing and lucrative cybersecurity field. Information security analysts can expect high salaries and strong growth over the next decade.<\/p>\r\n<p>This page explains how to become an information security analyst. We cover the education, experience, and certifications that prepare people for this field. We also describe what to expect from potential information security analyst careers.<\/p>\r\n\r\n<h2>What Is an Information Security Analyst?<\/h2>\r\n<p>Information security analysts ensure security measures that keep organizations' computer networks and systems safe. Security analysts conduct penetration testing, investigate security breaches, and install software to protect valuable data.<\/p>\r\n<p>An information security analyst's career focuses on cybersecurity, a subfield of computer science. Cybersecurity professionals need an advanced understanding of networks and computers to prevent and respond to cyberattacks.<\/p>\r\n<div class=\"pullquote inline-block text-xl font-bold \n\">\n    <p>\r\n    Security analysts conduct penetration testing, investigate security breaches, and install software to protect valuable data.\r\n<\/p>\n<\/div>\n\n    \r\n<p>Information security analysts often work with their organizations' information technology departments. Security analysts typically collaborate with computer systems analysts and network administrators to help other employees understand security products and procedures. These professionals find work in industries such as computer systems design, finance and insurance, and information organizations.<\/p>\r\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"https:\/\/www.computerscience.org\/careers\/information-security-analyst\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Read more about information security analysts<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"required-education\" id=\"required-education\"><\/a>\n\n\r\n<h2>What Education Do Information Security Analysts Need?<\/h2>\r\n<p>Information security analysts typically need at least a bachelor's degree in a field like cybersecurity, computer science, or IT. Some security analysts earn degrees in disciplines like engineering or math. Most bachelor's degrees take four full-time years to complete.<\/p>\r\n<p>Some employers prefer applicants with a <a href=\"\/degrees\/masters\/information-systems\/\">master's in information systems<\/a> or a related field. A master's degree usually takes two full-time years to complete.<\/p>\r\n<p>Individuals with a master's degree in information security earn more on average than those with only a bachelor's. January 2022 <a href=\"https:\/\/www.payscale.com\/research\/US\/Degree=Bachelor_of_Science_(BS_%2F_BSc)%2C_Information_Security\/Salary\" target=\"_blank\" rel=\"nofollow noopener\">Payscale data<\/a> shows the average annual salary for bachelor's in information science graduates is $77,000. The average salary for professionals with a master's in information science is <a href=\"https:\/\/www.payscale.com\/research\/US\/Degree=Master_of_Science_(MS)%2C_Information_Security\/Salary\" target=\"_blank\" rel=\"noopener\">$96,000 per year<\/a>.<\/p>\r\n<p><a href=\"\/bootcamps\/rankings\/cybersecurity\/\">Cybersecurity bootcamps<\/a> provide intensive, career-relevant training in a short period of time. Some people earn one or more college degrees and complete a cybersecurity bootcamp to develop practical, in-demand skills.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.computerscience.org\/cybersecurity\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore your degree options<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<section class=\"bootcamp-widget\">\n\t<div class=\"text-center mb-8\">\n\t\t<sonic-tooltip class=\"block text-xs text-center mb-4\" label=\"Learn More About Our Partners\">\n\t\t\t<span>ComputerScience.org is an advertising-supported site. Featured or trusted partner programs and all school search, finder, or match results are for schools that compensate us. This compensation does not influence our school rankings, resource guides, or other editorially-independent information published on this site.<\/span>\n\t\t<\/sonic-tooltip>\n\t\t<style>\n\t\t\tsonic-tooltip {\n\t\t\t\t--body-font-size: 10px;\n\t\t\t\t--content-font-size: 12px;\n\t\t\t}\n\t\t\t.bootcamp-widget p {\n\t\t\t\tmargin: 16px 0 24px;\n\t\t\t}\n\t\t\t.bootcamp-widget h3 {\n\t\t\t\tmargin-bottom: 16px;\n\t\t\t}\n\t\t<\/style>\n\t<\/div>\n\t<div class=\"text-center rounded bg-white box-border px-4 pb-10 mx-auto w-full shadow-lg border-8 border-gray-50\">\n\t\t<img decoding=\"async\" class=\"m-auto -mt-8\" src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,fl_lossy,q_auto\/w_120,h_82,c_fill,f_auto,fl_lossy,q_auto\/v1645732537\/ComputerScience.org\/computer\/computer.png\" width=\"120\" height=\"82\" loading=\"lazy\" alt=\"\"\/>\n\t\t<h3 class=\"no-margin text-2xl md:text-3xl font-bold mt-8 md:mt-12 mb-2 md:mb-3 px-4\">Match me with a bootcamp.<\/h3>\n\t\t<p class=\"no-margin text-base mb-8 px-3\">Find programs with your skills, schedule, and goals in mind.<\/p>\n\t\t<a href=\"\/discover?dcs[degrees][]=Bootcamps\" rel=\"noreferrer nofollow\" class=\"sonic-btn bg-secondary-700 hover:bg-secondary-800 focus:bg-secondary-800 uppercase mx-auto w-64 font-heading text-sm\" target=\"_blank\">MATCH ME TO A BOOTCAMP<\/a>\n\t<\/div>\n<\/section>\n\n\n\r\n\r\n<h2>How Much Experience Do Information Security Analysts Need?<\/h2>\r\n<p>In addition to a bachelor's degree, most employers require information security analysts to hold previous information technology or computer-related experience. This requirement varies by employer and position. Many security analysts start their careers as computer or network system administrators, database administrators, or computer systems analysts.<\/p>\r\n<p>Some employers let information security analysts substitute education for experience. Other workplaces may hire applicants without a bachelor's degree, letting them substitute experience for the education requirement.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"certifications\" id=\"certifications\"><\/a>\n\n\r\n<h2>Certifications<\/h2>\r\n<p>An <a href=\"\/careers\/cybersecurity\/information-security-analyst\/day-in-the-life\/\">information security analyst career<\/a> can benefit from professional certifications, which demonstrate advanced professional knowledge and skills. Although no certifications are required at state or national levels for this career, many employers prefer information security analysts with a professional certification.<\/p>\r\n<p>Below, we describe some potential certifications for information security analysts.<\/p>\r\n<p><a href=\"https:\/\/www.isc2.org\/Certifications\/CISSP\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Certified Information Systems Security Professional<\/strong><\/a><strong>: <\/strong>The CISSP certification is a general information security certificate for experienced professionals. Applicants must have at least five years of paid experience, pass an exam, and agree to a code of ethics.<\/p>\r\n<p><a href=\"https:\/\/www.isc2.org\/Certifications\/SSCP\" target=\"_blank\" rel=\"nofollow noopener\"><strong>Systems Security Certified Practitioner<\/strong><\/a><strong>: <\/strong>Earning the SSCP certification demonstrates advanced knowledge and technical skills in IT infrastructure security best practices. Applicants must have at least one year of paid experience, pass an exam, and agree to a code of ethics.<\/p>\r\n<p><a href=\"https:\/\/www.comptia.org\/certifications\/cybersecurity-analyst\" target=\"_blank\" rel=\"nofollow noopener\"><strong>CompTIA Cybersecurity Analyst<\/strong><\/a><strong>: <\/strong>Created for intermediate cybersecurity professionals, the CySA+ certification requires passing an exam with multiple-choice, hands-on, and performance-based questions. CySA+ certified professionals must renew their credential every three years by completing 60 continuing education units.<\/p>\r\n\r\n<div class=\"grid lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.computerscience.org\/degrees\/certifications\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about certifications for computer science professionals<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.computerscience.org\/resources\/top-it-certifications\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Top IT certifications to boost your computer science career<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n<h2>How Do I Become an Information Security Analyst?<\/h2>\r\n<p>You can launch an information security analyst career through several pathways. The most direct route to becoming an information security analyst is to earn a four-year bachelor's degree in a computer science-related field. Some security analysts also earn a master's degree to increase their earning potential and career opportunities.<\/p>\r\n<p>Some people learn information security skills and knowledge by completing an intensive bootcamp instead of a traditional higher education degree.<\/p>\r\n<p>Most security analyst jobs require some professional IT experience. Some employers allow applicants to substitute education for experience, or vice versa. Although not required, completing professional certifications can open the door to better opportunities by keeping security analysts' skills up to date.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"career-steps\" id=\"career-steps\"><\/a>\n\n\r\n<h3>Steps to Becoming an Information Security Analyst<\/h3>\r\n\r\n<h3 class=\"sonic-btn text-center\" style=\"background-color:#EAF1FE\"><span class=\"heading-4\" style=\"color:black\">Bachelor's Degree Path<\/h3>\r\n<ol>\r\n<li><strong>Earn a bachelor's degree<\/strong>. Most information security analyst jobs require at least a bachelor's degree. Potential majors include information security, cybersecurity, information technology, and computer science.<\/li>\r\n<li><strong>Get professional experience.<\/strong> Most security analyst jobs require some relevant experience in an IT or computers job. Some bachelor's programs offer internships that let students gain professional experience while still in school. Many graduates start their information security analyst career in entry-level IT roles.<\/li>\r\n<li><strong>Obtain professional certifications<\/strong>. Although the field does not require a blanket certification for security analysts, becoming certified can open the door to more opportunities. Employers often prefer job applicants who hold security certifications, which demonstrate proficiency in technical skills and knowledge.<\/li>\r\n<li><strong>Complete continuing education<\/strong>. Enrolling in professional development training and continuing education courses helps security analysts stay current on best practices in the field. You may need to complete continuing education to maintain or renew your professional certifications.<\/li>\r\n<\/ol>\r\n\r\n\r\n<h3 class=\"sonic-btn text-center\" style=\"background-color:#EAF1FE\"><span class=\"heading-4\" style=\"color:black\">Bootcamp Path<\/h3>\r\n<ol>\r\n    <li><strong>Complete a cybersecurity bootcamp.<\/strong><\/li> <br>\r\n        Cybersecurity bootcamps provide practical, hands-on training in information security skills and knowledge. They can prepare students for entry-level information security jobs in less time and for less money than the typical four-year bachelor's program. \r\n        Many people who complete a cybersecurity bootcamp already hold an associate or bachelor's degree in an unrelated field.\r\n        \r\n    <li><strong>Get professional experience.<\/strong><\/li>\r\n    <li><strong>Obtain professional certifications.<\/strong><\/li>\r\n    <li><strong>Complete continuing education.<\/strong><\/li>\r\n<\/ol>\r\n\r\n<div class=\"relative py-3 my-10\">\n  <div class=\"sonic-editorial-bg absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-gray-50\"><\/div>\n    <h2 class=\"text-center mb-8\">Top Online Programs<\/h2>\n      <p class=\"text-center mb-8\">Explore programs of your interests with the high-quality standards and flexibility you need to take your career to the next level.<\/p>\n    <sonic-editorial-listings\n    limit=\"4\"\n    layout=\"grid\"\n    offset=\"0\"\n  ><\/sonic-editorial-listings>\n<\/div>\n\n\n\r\n\r\n<h3>Should I Become an Information Security Analyst?<\/h3>\r\n<div class=\"biography flex flex-col justify-center md:justify-start md:flex-row items-center rounded-lg shadow-lg p-8 bg-white \">\n        <img decoding=\"async\" class=\"object-cover mb-8 rounded-lg max-h-60 md:mb-0\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/v1637693068\/experts\/Josh_Smith.jpg\" alt=\"Portrait of Josh Smith\" height=\"240\" loading=\"lazy\">\n    <div class=\"md:ml-8\">\n    <h4 class=\"mb-1 font-bold leading-6 biography__title\">Josh Smith<\/h4>\n        <div class=\"mt-4 text-lg leading-6 text-gray-500 md:mb-0 md:pb-0\">\n      \r\n<p slot=\"contentRight\"><a href=\"https:\/\/www.linkedin.com\/in\/joshuaisaacsmith\/\" target=\"_blank\" rel=\"nofollow noopener\">Josh Smith<\/a> is a cybersecurity analyst at <a href=\"https:\/\/www.nuspire.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Nuspire<\/a>, where he specializes in information systems security. As part of the security intelligence and analytics team, Josh is an expert at identifying cybersecurity trends, analyzing threat actors, and curating operational threat intelligence.<\/p>\r\n\n    <\/div>\n      <\/div>\n<\/div>\n\n\n\r\n\r\n<strong>What are some high and low points for this career? What challenges might information security analysts face?<\/strong>\r\n<p>Anyone who becomes an information security analyst will experience an exciting and dynamic position that can shift daily as trends in cybersecurity do. The career remains fresh as you&rsquo;ll see new things daily and you'll know you're helping organizations stay secure. It can be challenging at times with the demands on time. Threat actors never sleep and you may work late nights, weekends, or holidays if there is an incident to respond to.<\/p>\r\n<strong>What type of person does well in this role?<\/strong>\r\n<p>A person with analytical skills. Someone who can detect anomalies in data and have the drive to hunt down why they're there. It may be something legitimate happening, or potentially something malicious. Also a person who can be flexible with their time.<\/p>\r\n<strong>Who does this role help? How does this role impact others?<\/strong>\r\n<p>This role helps organizations understand threats they may face and detect intrusion within their organization. The intelligence found will support the general cybersecurity community along with clients and their own organization.<\/p>\r\n<strong>Why do we need more information security analysts?<\/strong>\r\n<p>Cybersecurity attacks are still increasing and technology will always have vulnerabilities. It takes dedicated security analysts to help protect clients and organizations worldwide.<\/p>\r\n<strong>What next-level roles can information security analysts take on?<\/strong>\r\n<p>Security Analysts can specialize in roles that may assist with incident response, threat intelligence, or move into management roles with those teams.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.computerscience.org\/cybersecurity\/careers\/information-security-analyst\/career-outlook-and-salary\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Salary insights for information security analysts<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.computerscience.org\/cybersecurity\/careers\/information-security-analyst\/day-in-the-life\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">What does a typical day for an information security analyst look like?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<br>\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"the-job-hunt\" id=\"the-job-hunt\"><\/a>\n\n\r\n<h3>The Job Hunt<\/h3>\r\n<p>To find the first job of your information security analyst career, look at job fairs, annual conferences, professional group networking events, and online job boards. Ask mentors, former work or internship supervisors, and professors for recommendations and leads on security analyst openings.<\/p>\r\n<p>Most universities have career development centers where students and recent graduates can get help finding a job. Common services include resume-writing help, mock interviews, and professional development training and workshops.<\/p>\r\n<p>Consult the popular online job boards below for information security analyst postings.<\/p>\r\n\r\n<sonic-resource-list title=\"Info-Sec Jobs\" titleLink=\"https:\/\/infosec-jobs.com\/\" rel=\"nofollow\" target=\"_blank\">\r\n  This job board includes listings for cybersecurity, cryptography, penetration testing, and vulnerability analysis openings. Job-seekers can set up free email alerts to notify them about new postings that match their criteria.\r\n<\/sonic-resource-list>\r\n<sonic-resource-list title=\"Dice Cybersecurity Jobs\" titleLink=\"https:\/\/www.dice.com\/jobs?q=cybersecurity&amp;countryCode=US&amp;radius=30&amp;radiusUnit=mi&amp;page=1&amp;pageSize=20&amp;language=en\" target=\"true\">\r\n    Cybersecurity and general tech professionals can find job postings, trending skills, and projected salaries on this site. Dice receives more than 1,000 new job listings a day.\r\n<\/sonic-resource-list>\r\n<sonic-resource-list title=\"CareersInCyber.com\" titleLink=\"https:\/\/www.careersincyber.com\/\" target=\"true\">\r\n    This site includes cybersecurity, technology risk, and IT governance job posting and career resources. Jobseekers can upload their resumes and receive email alerts for new listings.\r\n<\/sonic-resource-list>\r\n<sonic-resource-list title=\"The Cybersecurity Job Board\" titleLink=\"https:\/\/www.cybersecurityjobboards.com\/\" target=\"true\">\r\n    One of the most-visited websites for cybersecurity jobs, this site posts listings for openings in the U.S. and abroad.\r\n<\/sonic-resource-list>\r\n<sonic-resource-list title=\"Indeed.com\" titleLink=\"https:\/\/www.indeed.com\/\" target=\"true\">\r\n    One of the biggest job boards in the world, Indeed lets users search for jobs and post their resumes for free. The site boasts 250 million unique monthly visitors.\r\n<\/sonic-resource-list>\r\n<br>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n<h2>Questions About Information Security Analysts<\/h2>\r\n\r\n    <section>\r\n      <h3>What skills do you need to be an information security analyst?<\/h3>\r\n      <span itemprop=\"active\"><\/span>\r\n      <p>Information security analysts need excellent analytical, teamwork, and problem-solving skills. They also need tech knowledge in security, networking, and incident response and reporting.<\/p>\r\n    <\/section>\r\n    <section>\r\n      <h3>How do I become a security analyst?<\/h3>\r\n      <span itemprop=\"active\"><\/span>\r\n      <p>Security analysts typically earn a bachelor's degree and gain professional experience to qualify for entry-level jobs. Completing a cybersecurity bootcamp is another route into the field. Completing optional professional certifications can also lead to more security analyst positions.<\/p>\r\n    <\/section>\r\n    <section>\r\n      <h3>Do you need a degree to be a cybersecurity analyst?<\/h3>\r\n      <p>Most security analyst positions require at least a four-year <a href=\"\/degrees\/bachelors\/information-technology\/\">bachelor's degree in information technology<\/a> and computers or a related field. Some employers let workers substitute experience for education requirements. Completing a cybersecurity bootcamp may qualify graduates for more advanced positions.<\/p>\r\n    <\/section>\r\n    <section>\r\n      <h3>Are cybersecurity jobs boring?<\/h3>\r\n      <p>Information security analyst careers require skills that evolve alongside new cyberthreats and emerging technologies. Like any career, some aspects of cybersecurity jobs can be repetitive or boring, like documenting information or going to meetings.<\/p>\r\n    <\/section>\r\n\r\n<br>\r\n<h3><strong>Reviewed by:<\/strong><\/h3>\r\n<div class=\"biography flex flex-col justify-center md:justify-start md:flex-row items-center rounded-lg shadow-lg p-8 bg-secondary-50 \">\n        <img decoding=\"async\" class=\"object-cover mb-8 rounded-lg max-h-60 md:mb-0\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/v1629898650\/experts\/Brian_Nichols.png\" alt=\"Portrait of Brian Nichols\" height=\"240\" loading=\"lazy\">\n    <div class=\"md:ml-8\">\n    <h4 class=\"mb-1 font-bold leading-6 biography__title\">Brian Nichols<\/h4>\n        <div class=\"mt-4 text-lg leading-6 text-gray-500 md:mb-0 md:pb-0\">\n      \r\n    <p slot=\"contentRight\">Born and raised in upstate New York, <a href=\"https:\/\/www.linkedin.com\/in\/brnichols\/\" target=\"_blank\" rel=\"nofollow noopener\">Brian Nichols<\/a> began his IT education through a vocational high school where he focused on computer science, IT fundamentals, and networking. Brian then went to his local community college, where he received his associate of science in computer information science. He then received his bachelor of science in applied networking and system administration from a private college. Brian now lives in Kansas City, where he works full-time as a DevOps engineer. Brian is also a part-time instructor in cybersecurity. He's passionate about cybersecurity and helping students succeed. Brian Nichols is a paid member of the Red Ventures Education freelance review network.<\/p>\r\n\n    <\/div>\n      <\/div>\n<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"Ever wondered what a day in the life of a cyber security analyst is like? Now is an excellent time to enter the growing and lucrative cybersecurity field. Information security&#8230;","protected":false},"author":56,"featured_media":6318,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"bootcamps":[],"states":[],"resources":[],"careers":[19],"degrees":[],"class_list":["post-6273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","careers-all"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/6273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/comments?post=6273"}],"version-history":[{"count":3,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/6273\/revisions"}],"predecessor-version":[{"id":14041,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/6273\/revisions\/14041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/media\/6318"}],"wp:attachment":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/media?parent=6273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/categories?post=6273"},{"taxonomy":"bootcamps","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/bootcamps?post=6273"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/states?post=6273"},{"taxonomy":"resources","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/resources?post=6273"},{"taxonomy":"careers","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/careers?post=6273"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/degrees?post=6273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}