{"id":1991,"date":"2023-08-29T09:55:15","date_gmt":"2023-08-29T09:55:15","guid":{"rendered":"https:\/\/k3ylabs.com\/?p=1991"},"modified":"2023-08-30T06:30:37","modified_gmt":"2023-08-30T06:30:37","slug":"cybersecurity-analyst","status":"publish","type":"post","link":"https:\/\/k3ylabs.com\/el\/career\/cybersecurity-analyst\/","title":{"rendered":"Cybersecurity Analyst\/Researcher"},"content":{"rendered":"<div id=\"pl-1991\"  class=\"panel-layout\" ><div id=\"pg-1991-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1991-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1991-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"color: #ffffff;\"><strong>Location<\/strong>: K3Y, Vas.Olgas 193 &amp; Zacharia Papantoniou 1, <\/span><span style=\"color: #ffffff;\">546 46 Thessaloniki, Greece<br \/>\n<\/span><\/p>\n<p><span style=\"color: #ffffff;\"><strong>Employment<\/strong>: Fix-term; full-time (40 hours)<\/span><\/p>\n<p><span style=\"color: #ffffff;\"><strong>Job Description<br \/>\n<\/strong>K3Y is looking for a Cybersecurity Analyst\/Researcher who will play a key role in our team with respect to the development of cybersecurity applications in the context of European R&amp;D projects (Horizon 2020 and Horizon Europe projects) and commercial activities.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Basic Qualifications<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">Bachelor's degree in computer science or a related field<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Strong proficiency in Python programming<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with network protocols<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with cybersecurity tools like Tcpdump, Wireshark and Scapy<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Understanding of Security Information and Event Management (SIEM), firewalls and Intrusion Detection and Prevention Systems (IDPS)<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Familiarity with deep packet inspection techniques and network flow analysers such as nDPI, NFStream, etc.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Excellent written and oral communication skills<br \/>\n<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Desirable Qualifications<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">MSc or PhD degree in cybersecurity or a relative field<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with Horizon 2020 and Horizon Europe Research and Development (R&amp;D) projects<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with honeypots<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with threat modelling<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with risk assessment methods<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Experience with DevOps and CI\/CD best practices<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Certifications in network and cybersecurity (e.g., CCNA, CISSP, CEH) are highly desirable<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Responsibilities<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">Develop and maintain security tools, taking full advantage of novel technologies<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of Intrusion Detection Systems (IDS) and honeypots<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of threat intelligence mechanisms<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of attack generators and penetration testing tools<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Analysis of security logs<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Development of intrusion detection datasets<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Supporting cybersecurity-related analytics and predictive models<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Conducting in-depth research on current and emerging cyber threats, vulnerabilities, and attack vectors<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Editing, authoring and delivery of technical reports and deliverables<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Participation in technical meetings<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Staying up-to-date with the latest network and cybersecurity technologies, tools, and trends<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Benefits<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">Collaborative and innovative work environment with a strong European and international network<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Competitive salary and benefits package based on qualifications and experience<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Flexible working hours<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Opportunities for professional growth and development<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Equal Opportunities<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">K3Y\u00a0 is committed to providing equal employment opportunities and creating an inclusive workplace. We do not discriminate on the basis of race, colour, ancestry, religion, gender, national origin, sexual orientation, age, citizenship, marital status, disability, veteran status, or any other legally protected characteristics.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #ffffff;\"><strong>Preferred Starting Date<\/strong><\/span><\/p>\n<p><span style=\"color: #ffffff;\">While there is no fixed application deadline, we are eager to fill this position as soon as possible. Qualified applicants can expect an interview invitation within a few days of submitting their application.<\/span><\/p>\n<p><span style=\"color: #ffffff;\"><strong>Please send your resumes to the following email: pradoglou@k3y.bg<\/strong><\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Location: K3Y, Vas.Olgas 193 &amp; Zacharia Papantoniou 1, 546 46 Thessaloniki, Greece Employment: Fix-term; full-time (40 hours) Job Description K3Y is looking for a Cybersecurity Analyst\/Researcher who will play a key role in our team with respect to the development of cybersecurity applications in the context of European R&amp;D projects (Horizon 2020 and Horizon Europe&hellip; <a class=\"more-link\" href=\"https:\/\/k3ylabs.com\/el\/career\/cybersecurity-analyst\/\">\u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf <span class=\"screen-reader-text\">Cybersecurity Analyst\/Researcher<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":845,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-1991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Analyst\/Researcher - k3y<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/k3ylabs.com\/el\/career\/cybersecurity-analyst\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Analyst\/Researcher - k3y\" \/>\n<meta property=\"og:description\" content=\"Location: K3Y, Vas.Olgas 193 &amp; Zacharia Papantoniou 1, 546 46 Thessaloniki, Greece Employment: Fix-term; full-time (40 hours) Job Description K3Y is looking for a Cybersecurity Analyst\/Researcher who will play a key role in our team with respect to the development of cybersecurity applications in the context of European R&amp;D projects (Horizon 2020 and Horizon Europe&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf Cybersecurity Analyst\/Researcher\" \/>\n<meta property=\"og:url\" content=\"https:\/\/k3ylabs.com\/el\/career\/cybersecurity-analyst\/\" \/>\n<meta property=\"og:site_name\" content=\"k3y\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-29T09:55:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-30T06:30:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"795\" \/>\n\t<meta property=\"og:image:height\" content=\"518\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"deasytal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"deasytal\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 \u03bb\u03b5\u03c0\u03c4\u03ac\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/\"},\"author\":{\"name\":\"deasytal\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/e3d5f6d9755e4eaceec9213e18ca7128\"},\"headline\":\"Cybersecurity Analyst\\\/Researcher\",\"datePublished\":\"2023-08-29T09:55:15+00:00\",\"dateModified\":\"2023-08-30T06:30:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/\"},\"wordCount\":405,\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\",\"articleSection\":[\"Career\"],\"inLanguage\":\"el\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/\",\"name\":\"Cybersecurity Analyst\\\/Researcher - k3y\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\",\"datePublished\":\"2023-08-29T09:55:15+00:00\",\"dateModified\":\"2023-08-30T06:30:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/e3d5f6d9755e4eaceec9213e18ca7128\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/#primaryimage\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\",\"contentUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png\",\"width\":795,\"height\":518,\"caption\":\"K3Y R&D\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/career\\\/cybersecurity-analyst\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/k3ylabs.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Analyst\\\/Researcher\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/\",\"name\":\"k3y\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/k3ylabs.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"el\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/e3d5f6d9755e4eaceec9213e18ca7128\",\"name\":\"deasytal\",\"sameAs\":[\"http:\\\/\\\/wp-json\\\/wp\\\/v2\\\/users\\\/me\"],\"url\":\"https:\\\/\\\/k3ylabs.com\\\/el\\\/author\\\/deasytal\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Analyst\/Researcher - k3y","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/k3ylabs.com\/el\/career\/cybersecurity-analyst\/","og_locale":"el_GR","og_type":"article","og_title":"Cybersecurity Analyst\/Researcher - k3y","og_description":"Location: K3Y, Vas.Olgas 193 &amp; Zacharia Papantoniou 1, 546 46 Thessaloniki, Greece Employment: Fix-term; full-time (40 hours) Job Description K3Y is looking for a Cybersecurity Analyst\/Researcher who will play a key role in our team with respect to the development of cybersecurity applications in the context of European R&amp;D projects (Horizon 2020 and Horizon Europe&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf Cybersecurity Analyst\/Researcher","og_url":"https:\/\/k3ylabs.com\/el\/career\/cybersecurity-analyst\/","og_site_name":"k3y","article_published_time":"2023-08-29T09:55:15+00:00","article_modified_time":"2023-08-30T06:30:37+00:00","og_image":[{"width":795,"height":518,"url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","type":"image\/png"}],"author":"deasytal","twitter_card":"summary_large_image","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"deasytal","\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2":"2 \u03bb\u03b5\u03c0\u03c4\u03ac"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/#article","isPartOf":{"@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/"},"author":{"name":"deasytal","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/e3d5f6d9755e4eaceec9213e18ca7128"},"headline":"Cybersecurity Analyst\/Researcher","datePublished":"2023-08-29T09:55:15+00:00","dateModified":"2023-08-30T06:30:37+00:00","mainEntityOfPage":{"@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/"},"wordCount":405,"image":{"@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","articleSection":["Career"],"inLanguage":"el"},{"@type":"WebPage","@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/","url":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/","name":"Cybersecurity Analyst\/Researcher - k3y","isPartOf":{"@id":"https:\/\/k3ylabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/#primaryimage"},"image":{"@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","datePublished":"2023-08-29T09:55:15+00:00","dateModified":"2023-08-30T06:30:37+00:00","author":{"@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/e3d5f6d9755e4eaceec9213e18ca7128"},"breadcrumb":{"@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/"]}]},{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/#primaryimage","url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","contentUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2023\/03\/\u03a3\u03c7\u03ad\u03b4\u03b9\u03bf-\u03c7\u03c9\u03c1\u03af\u03c2-\u03c4\u03af\u03c4\u03bb\u03bf-1.png","width":795,"height":518,"caption":"K3Y R&D"},{"@type":"BreadcrumbList","@id":"https:\/\/k3ylabs.com\/career\/cybersecurity-analyst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/k3ylabs.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Analyst\/Researcher"}]},{"@type":"WebSite","@id":"https:\/\/k3ylabs.com\/#website","url":"https:\/\/k3ylabs.com\/","name":"k3y","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/k3ylabs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"el"},{"@type":"Person","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/e3d5f6d9755e4eaceec9213e18ca7128","name":"deasytal","sameAs":["http:\/\/wp-json\/wp\/v2\/users\/me"],"url":"https:\/\/k3ylabs.com\/el\/author\/deasytal\/"}]}},"_links":{"self":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/1991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/comments?post=1991"}],"version-history":[{"count":7,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/1991\/revisions"}],"predecessor-version":[{"id":2009,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/1991\/revisions\/2009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media\/845"}],"wp:attachment":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media?parent=1991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/categories?post=1991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/tags?post=1991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}