{"id":19559,"date":"2025-09-08T19:51:15","date_gmt":"2025-09-08T09:51:15","guid":{"rendered":"https:\/\/www.pulserecruitment.com.au\/?p=19559"},"modified":"2025-09-08T19:51:15","modified_gmt":"2025-09-08T09:51:15","slug":"cybersecurity-job-interview-questions","status":"publish","type":"post","link":"https:\/\/www.pulserecruitment.com.au\/cybersecurity-job-interview-questions\/","title":{"rendered":"Cybersecurity Job Interview Questions"},"content":{"rendered":"<div class=\"response-container-content ng-tns-c2287985031-25\">\n<p><span class=\"selected\">Securing a job in cybersecurity can be a daunting process, but it&#8217;s also one of the most rewarding careers in the modern world. The field is dynamic, the threats are ever-evolving, and the demand for skilled professionals is higher than ever. To land your dream role, you need more than just technical knowledge; you need to demonstrate critical thinking, problem-solving skills, and a proactive mindset.<\/span><\/p>\n<p><span class=\"selected\">This comprehensive guide will walk you through the types of questions you can expect in a cybersecurity interview, from foundational technical concepts to challenging behavioral and situational scenarios. By preparing thoroughly, you&#8217;ll be able to showcase your expertise and prove you have what it takes to protect an organization&#8217;s most valuable assets.<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<blockquote><p><img decoding=\"async\" class=\"aligncenter wp-image-18499 size-full\" src=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/03\/3.-Handle-Common-Sales-Interview-Questions-with-Confidence.webp\" alt=\"3. Handle Common Sales Interview Questions with Confidence\" width=\"1000\" height=\"300\" srcset=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/03\/3.-Handle-Common-Sales-Interview-Questions-with-Confidence.webp 1000w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/03\/3.-Handle-Common-Sales-Interview-Questions-with-Confidence-300x90.webp 300w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2025\/03\/3.-Handle-Common-Sales-Interview-Questions-with-Confidence-768x230.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<div class=\"response-container-content ng-tns-c2287985031-25\">\n<h2><span class=\"selected\">Part 1: The Technical Foundations\u2014Prove Your Knowledge<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span class=\"selected\">Technical questions are the cornerstone of any cybersecurity interview. They&#8217;re designed to assess your understanding of fundamental concepts and your ability to apply them in real-world scenarios. Don&#8217;t just memorize definitions; be prepared to explain the &#8220;why&#8221; and &#8220;how&#8221; behind each concept.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">1. The CIA Triad<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> Can you explain the CIA Triad and its importance in information security? <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> This is a classic foundational question. Start by defining each component:<\/span><\/p>\n<ul>\n<li><strong><span class=\"selected\">Confidentiality:<\/span><\/strong><span class=\"selected\"> Ensuring that data is accessed only by authorized parties. This can be achieved through methods like encryption, access control lists, and multi-factor authentication.<\/span><\/li>\n<li><strong><span class=\"selected\">Integrity:<\/span><\/strong><span class=\"selected\"> Maintaining the accuracy and consistency of data throughout its lifecycle. This is protected by technologies like hashing, digital signatures, and version control.<\/span><\/li>\n<li><strong><span class=\"selected\">Availability:<\/span><\/strong><span class=\"selected\"> Ensuring that systems and data are accessible to authorized users when needed. This is guaranteed through measures like redundant systems, disaster recovery plans, and network resilience. Connect these three principles to the core objective of a cybersecurity professional: to protect an organization&#8217;s information.<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">2. Encryption vs. Hashing<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> What is the difference between encryption and hashing, and when would you use each? <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> This question tests your grasp of two critical data protection techniques. Explain the core difference: encryption is a two-way process (you can decrypt the data to its original form), while hashing is a one-way process (it is irreversible).<\/span><\/p>\n<ul>\n<li><strong><span class=\"selected\">Encryption:<\/span><\/strong><span class=\"selected\"> Used for data in transit or at rest where the data needs to be retrieved later. Mention types like symmetric (e.g., AES) and asymmetric (e.g., RSA).<\/span><\/li>\n<li><strong><span class=\"selected\">Hashing:<\/span><\/strong><span class=\"selected\"> Used to verify data integrity or securely store passwords. The hash is a unique digital fingerprint, and any change to the original data will produce a different hash. Mention popular algorithms like SHA-256.<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">3. Vulnerability, Threat, and Risk<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> Differentiate between a threat, a vulnerability, and a risk. <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> These terms are often used interchangeably but have distinct meanings.<\/span><\/p>\n<ul>\n<li><strong><span class=\"selected\">Threat:<\/span><\/strong><span class=\"selected\"> A potential danger or a possible attack. It is external and can be malicious (e.g., a hacker) or non-malicious (e.g., a natural disaster).<\/span><\/li>\n<li><strong><span class=\"selected\">Vulnerability:<\/span><\/strong><span class=\"selected\"> A weakness or a flaw in a system or process that a threat can exploit. Examples include unpatched software, weak passwords, or a lack of security awareness training.<\/span><\/li>\n<li><strong><span class=\"selected\">Risk:<\/span><\/strong><span class=\"selected\"> The potential for a threat to exploit a vulnerability, resulting in a loss or negative impact. This is often calculated as: <\/span><code><span class=\"selected\">Risk = Threat \u00d7 Vulnerability \u00d7 Impact<\/span><\/code><span class=\"selected\">. Your answer should demonstrate that you understand how these three components combine to form a complete picture of a security challenge.<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">4. Firewall vs. IDS vs. IPS<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> Explain the difference between a firewall, an Intrusion Detection System (IDS), and an Intrusion Prevention System (IPS). <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> Describe each technology&#8217;s primary function and how they differ in their response to threats.<\/span><\/p>\n<ul>\n<li><strong><span class=\"selected\">Firewall:<\/span><\/strong><span class=\"selected\"> A security device that monitors and filters network traffic based on a set of predefined rules. It is a fundamental barrier that allows or denies traffic based on source, destination, port, and protocol.<\/span><\/li>\n<li><strong><span class=\"selected\">IDS:<\/span><\/strong><span class=\"selected\"> A system that passively monitors network traffic or system logs for suspicious activity. If it detects a potential threat, it generates an alert but takes no action to block the traffic. It&#8217;s like a security guard who raises an alarm.<\/span><\/li>\n<li><strong><span class=\"selected\">IPS:<\/span><\/strong><span class=\"selected\"> Similar to an IDS, but it takes an active role in preventing attacks. Upon detecting a threat, an IPS can automatically block the malicious traffic, drop the packet, or reset the connection. It&#8217;s like a security guard who not only raises an alarm but also physically intervenes to stop the intruder.<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">5. The OSI Model<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> Explain the OSI model and why it is relevant to cybersecurity. <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> This question tests your fundamental networking knowledge. Briefly explain the seven layers of the OSI (Open Systems Interconnection) model:<\/span><\/p>\n<ol>\n<li><span class=\"selected\">Physical<\/span><\/li>\n<li><span class=\"selected\">Data Link<\/span><\/li>\n<li><span class=\"selected\">Network<\/span><\/li>\n<li><span class=\"selected\">Transport<\/span><\/li>\n<li><span class=\"selected\">Session<\/span><\/li>\n<li><span class=\"selected\">Presentation<\/span><\/li>\n<li><span class=\"selected\">Application Then, connect it to cybersecurity by explaining how attacks can occur at each layer and how different security tools operate at specific layers (e.g., firewalls at layers 3 and 4, and web application firewalls at layer 7).<\/span><\/li>\n<\/ol>\n<\/div>\n<p>&nbsp;<\/p>\n<blockquote><p><img decoding=\"async\" class=\"aligncenter wp-image-17587 size-full\" src=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/11\/Understanding-the-Role-of-Tech-Sales-What-Interviewers-Want-to-See.webp\" alt=\"Understanding the Role of Tech Sales: What Interviewers Want to See\" width=\"1000\" height=\"300\" srcset=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/11\/Understanding-the-Role-of-Tech-Sales-What-Interviewers-Want-to-See.webp 1000w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/11\/Understanding-the-Role-of-Tech-Sales-What-Interviewers-Want-to-See-300x90.webp 300w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/11\/Understanding-the-Role-of-Tech-Sales-What-Interviewers-Want-to-See-768x230.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<div class=\"response-container-content ng-tns-c2287985031-25\">\n<h2><span class=\"selected\">Part 2: The Behavioral and Situational Scenarios\u2014Show Your Mindset<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span class=\"selected\">These questions are designed to gauge your soft skills, problem-solving abilities, and how you would handle real-world challenges. The interviewer wants to see your thought process, not just a perfect, scripted response.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">1. Handling a Crisis<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> Describe a time when you had to respond to a security incident. What was your role, and what was the outcome? <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> Use the STAR method: <\/span><strong><span class=\"selected\">S<\/span><\/strong><span class=\"selected\">ituation, <\/span><strong><span class=\"selected\">T<\/span><\/strong><span class=\"selected\">ask, <\/span><strong><span class=\"selected\">A<\/span><\/strong><span class=\"selected\">ction, and <\/span><strong><span class=\"selected\">R<\/span><\/strong><span class=\"selected\">esult.<\/span><\/p>\n<ul>\n<li><strong><span class=\"selected\">Situation:<\/span><\/strong><span class=\"selected\"> Describe a specific security incident you faced (e.g., a malware infection, a phishing campaign, a potential data breach).<\/span><\/li>\n<li><strong><span class=\"selected\">Task:<\/span><\/strong><span class=\"selected\"> Explain your responsibility in the incident response process.<\/span><\/li>\n<li><strong><span class=\"selected\">Action:<\/span><\/strong><span class=\"selected\"> Detail the specific steps you took. Did you contain the threat? Did you work with other teams? Did you follow an incident response plan?<\/span><\/li>\n<li><strong><span class=\"selected\">Result:<\/span><\/strong><span class=\"selected\"> Explain the outcome. Did you successfully mitigate the threat? What did you learn from the experience? This is a great opportunity to show resilience and continuous learning.<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">2. Communicating with Non-Technical Stakeholders<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> You have an important company stakeholder who is putting sensitive data at risk due to poor security habits. How would you convince them to change their behavior? <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> This question assesses your communication and influencing skills.<\/span><\/p>\n<ul>\n<li><span class=\"selected\">Acknowledge the challenge: Start by recognizing that security is a shared responsibility and that some people may resist new policies due to convenience.<\/span><\/li>\n<li><span class=\"selected\">Focus on a non-confrontational approach: Instead of focusing on &#8220;what they are doing wrong,&#8221; frame it in terms of &#8220;how you can help them.&#8221;<\/span><\/li>\n<li><span class=\"selected\">Translate technical risk into business impact: Explain the potential consequences in terms they understand, such as financial loss, reputational damage, or loss of customer trust.<\/span><\/li>\n<li><span class=\"selected\">Provide a solution: Offer to provide training, simple tools, or a more convenient, secure alternative. The key is to demonstrate empathy and an ability to collaborate.<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">3. Disagreeing with a Coworker<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> Tell me about a time you disagreed with a coworker or manager about a security risk. How did you handle it? <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> This question tests your professionalism and ability to handle conflict.<\/span><\/p>\n<ul>\n<li><span class=\"selected\">Choose a specific, non-trivial example.<\/span><\/li>\n<li><span class=\"selected\">Focus on the process, not just the outcome. Did you present your case with data and evidence? Did you listen to their perspective?<\/span><\/li>\n<li><span class=\"selected\">Emphasize collaboration. Show that you were willing to work together to find a solution that satisfied both parties. The goal isn\u2019t to \u201cwin\u201d the argument, but to find the best outcome for the company&#8217;s security posture.<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">4. Staying Current<\/span><\/h3>\n<p><strong><span class=\"selected\">Question:<\/span><\/strong><span class=\"selected\"> How do you stay updated with the latest cybersecurity threats and trends? <\/span><strong><span class=\"selected\">Answer Strategy:<\/span><\/strong><span class=\"selected\"> This is a fantastic opportunity to show your passion and dedication to the field.<\/span><\/p>\n<ul>\n<li><span class=\"selected\">Mention specific resources you use: Industry blogs (e.g., Krebs on Security, SANS Internet Storm Center), threat intelligence feeds, professional organizations (e.g., ISC2, CompTIA), and security conferences (e.g., Black Hat, DEF CON).<\/span><\/li>\n<li><span class=\"selected\">Talk about practical application: Don\u2019t just list sources; explain how you apply this knowledge to your work. For example, &#8220;I follow the SANS NewsBites digest to stay aware of new vulnerabilities, and when a critical one is announced, I immediately check our systems for exposure.&#8221;<\/span><\/li>\n<\/ul>\n<\/div>\n<p>&nbsp;<\/p>\n<blockquote><p><img decoding=\"async\" class=\"aligncenter wp-image-17125 size-full\" src=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/10\/Acing-the-Sales-Job-Interview.webp\" alt=\"Acing the Sales Job Interview\" width=\"1000\" height=\"300\" srcset=\"https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/10\/Acing-the-Sales-Job-Interview.webp 1000w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/10\/Acing-the-Sales-Job-Interview-300x90.webp 300w, https:\/\/cdn-01.cms-ap-v2i.applyflow.com\/pulse-recruitment\/wp-content\/uploads\/2024\/10\/Acing-the-Sales-Job-Interview-768x230.webp 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<div class=\"response-container-content ng-tns-c2287985031-25\">\n<h2><span class=\"selected\">Part 3: Questions for Specific Roles<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span class=\"selected\">The questions will become more specialized depending on the role you&#8217;re applying for.<\/span><\/p>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">For a Security Analyst Role<\/span><\/h3>\n<ul>\n<li><span class=\"selected\">What is your experience with SIEM systems? What logs would you monitor to detect a malicious actor?<\/span><\/li>\n<li><span class=\"selected\">How would you approach a security incident that involves a sudden spike in outbound network traffic from a single workstation?<\/span><\/li>\n<li><span class=\"selected\">Explain the principle of least privilege. How would you apply it in an enterprise environment?<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">For a Penetration Tester Role<\/span><\/h3>\n<ul>\n<li><span class=\"selected\">What are the phases of a penetration test?<\/span><\/li>\n<li><span class=\"selected\">Walk me through the process of a SQL injection attack and how you would prevent it.<\/span><\/li>\n<li><span class=\"selected\">What is the difference between a black-box and a white-box penetration test?<\/span><\/li>\n<li><span class=\"selected\">Explain a scenario where you would use a tool like Wireshark or Nmap.<\/span><\/li>\n<\/ul>\n<h3><span class=\"selected\" style=\"color: #2c9a63;\">For a Cloud Security Role<\/span><\/h3>\n<ul>\n<li><span class=\"selected\">What are some of the key security challenges in a cloud environment (e.g., AWS, Azure, Google Cloud)?<\/span><\/li>\n<li><span class=\"selected\">How would you secure a newly deployed public-facing web application in the cloud?<\/span><\/li>\n<li><span class=\"selected\">Explain the concept of &#8220;shared responsibility&#8221; in cloud security.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span class=\"selected\">Part 4: Your Turn to Ask Questions<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span class=\"selected\">At the end of the interview, you&#8217;ll be given the chance to ask questions. This is not just a formality; it&#8217;s your opportunity to demonstrate your genuine interest and assess if the company is a good fit for you.<\/span><\/p>\n<ul>\n<li><strong><span class=\"selected\">&#8220;What does a typical day look like in this role?&#8221;<\/span><\/strong><\/li>\n<li><strong><span class=\"selected\">&#8220;What are the biggest security challenges facing the organization right now?&#8221;<\/span><\/strong><span class=\"selected\"> This shows you&#8217;re thinking proactively about potential threats.<\/span><\/li>\n<li><strong><span class=\"selected\">&#8220;How does the security team collaborate with other departments, such as engineering and IT?&#8221;<\/span><\/strong><span class=\"selected\"> This reveals how integrated security is within the company&#8217;s culture.<\/span><\/li>\n<li><strong><span class=\"selected\">&#8220;What opportunities are there for professional development and continuous learning within the team?&#8221;<\/span><\/strong><span class=\"selected\"> This shows your commitment to growth.<\/span><\/li>\n<\/ul>\n<p><span class=\"selected\">By preparing for these types of questions, you&#8217;ll be well on your way to a successful interview and a fulfilling career in cybersecurity. Good luck!<\/span><\/p>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<p style=\"text-align: center;\">READY TO TRANSFORM YOUR CAREER OR TEAM?<\/p>\n<div class=\"TypographyPresentation TypographyPresentation--m RichText3-paragraph--withVSpacingNormal RichText3-paragraph\" style=\"text-align: center;\">Whether you&#8217;re a professional eyeing your next career move or an employer seeking the best talent, uncover unparalleled <a class=\"PrimaryLink BaseLink\" href=\"https:\/\/www.pulserecruitment.com.au\/\" target=\"_blank\" rel=\"noreferrer noopener\">IT, sales, and marketing recruitment<\/a> in Sydney, Melbourne, Brisbane, and extending to the broader Australia, Asia-Pacific, and the United States. Pulse Recruitment is your bridge to job opportunities or candidates that align perfectly with your aspirations and requirements. Embark on a journey of growth and success today by <a class=\"PrimaryLink BaseLink\" href=\"https:\/\/www.pulserecruitment.com.au\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">getting in touch<\/a>!<\/div>\n<div class=\"TypographyPresentation TypographyPresentation--m RichText3-paragraph--withVSpacingNormal RichText3-paragraph\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Securing a job in cybersecurity can be a daunting process, but it&#8217;s also one of the most rewarding careers in the modern world. The field is dynamic, the threats are ever-evolving, and the demand for skilled professionals is higher than ever. To land your dream role, you need more than just technical knowledge; you need&hellip;<\/p>\n","protected":false},"author":15,"featured_media":19560,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","footnotes":""},"categories":[82],"tags":[],"class_list":["post-19559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-careers-hub"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/posts\/19559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/comments?post=19559"}],"version-history":[{"count":2,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/posts\/19559\/revisions"}],"predecessor-version":[{"id":19562,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/posts\/19559\/revisions\/19562"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/media\/19560"}],"wp:attachment":[{"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/media?parent=19559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/categories?post=19559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pulserecruitment.com.au\/af-api\/wp\/v2\/tags?post=19559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}