{"id":9341,"date":"2026-02-28T13:42:58","date_gmt":"2026-02-28T14:42:58","guid":{"rendered":"https:\/\/hadess.io\/?p=9341"},"modified":"2026-04-06T18:30:44","modified_gmt":"2026-04-06T18:30:44","slug":"cloud-security-engineer-2","status":"publish","type":"post","link":"https:\/\/hadess.io\/cloud-security-engineer-2\/","title":{"rendered":"Cloud Security Engineer: Protect Infrastructure at Scale"},"content":{"rendered":"<h1>Cloud Security Engineer<\/h1>\n<blockquote>\n<p><strong>Part of the <a href=\"https:\/\/career.hadess.io\/blog\/cybersecurity-career-guide\">Cybersecurity Career Guide<\/a><\/strong> \u2014 This article is one deep-dive in our complete guide series.<\/p>\n<\/blockquote>\n<p><em>By HADESS Team | February 28, 2026 | Updated: February 28, 2026 | 5 min read<\/em><\/p>\n<p>You design and implement security controls for cloud environments. Whether your organization runs on AWS, Azure, GCP, or a hybrid setup, you are the one making sure IAM policies are right, data is encrypted, networks are segmented, and misconfigurations do not turn into breaches.<\/p>\n<h2>What You Will Do<\/h2>\n<p><a href=\"https:\/\/hadess.io\/cloud-security-skills\/\" title=\"Cloud Security Skills: AWS, Azure, GCP\">Cloud security<\/a> engineering is hands-on work with infrastructure-as-code, cloud-native security services, and the constant challenge of securing environments that change faster than traditional data centers ever did.<\/p>\n<p>Your responsibilities include:<\/p>\n<ul>\n<li>Designing and implementing IAM policies, roles, and permission boundaries<\/li>\n<li>Configuring and maintaining cloud-native security services (<a href=\"https:\/\/hadess.io\/aws-guardduty-threat-detection\/\" title=\"AWS GuardDuty: Threat Detection and Response\">GuardDuty<\/a>, <a href=\"https:\/\/hadess.io\/aws-security-hub\/\" title=\"AWS Security Hub: Compliance Monitoring and Finding Aggregation\">Security Hub<\/a>, Azure Defender, Cloud SCC)<\/li>\n<li>Building security into IaC templates \u2014 Terraform, CloudFormation, Bicep<\/li>\n<li>Implementing <a href=\"https:\/\/hadess.io\/network-security-guide\/\" title=\"Network Security Fundamentals: Complete Guide\">network security<\/a> \u2014 VPCs, security groups, NACLs, private endpoints<\/li>\n<li>Managing encryption for data at rest and in transit \u2014 KMS, certificate management<\/li>\n<li>Setting up cloud logging and monitoring \u2014 <a href=\"https:\/\/hadess.io\/aws-cloudtrail-security\/\" title=\"AWS CloudTrail: Log Analysis and Security Monitoring\">CloudTrail<\/a>, Azure Activity Log, VPC Flow Logs<\/li>\n<li>Running cloud security posture management (CSPM) tools \u2014 Prowler, ScoutSuite, Prisma Cloud<\/li>\n<li>Automating security remediation with Lambda functions, Azure Functions, or Cloud Functions<\/li>\n<li>Reviewing architecture designs for security before deployment<\/li>\n<li>Responding to cloud-specific incidents \u2014 credential leaks, S3 bucket exposures, privilege escalation<\/li>\n<li>Maintaining compliance controls for SOC 2, PCI DSS, HIPAA in cloud environments<\/li>\n<\/ul>\n<p>You work closely with DevOps, platform, and development teams. If you cannot explain why a security control matters in terms they understand, it will not get implemented.<\/p>\n<h2>Skills You Need<\/h2>\n<p>Cloud security engineering requires deep cloud platform knowledge combined with security expertise.<\/p>\n<p>Build these:<\/p>\n<ul>\n<li><a href=\"https:\/\/career.hadess.io\/skills\">AWS\/Azure\/GCP security services<\/a> \u2014 native security tooling for at least one major platform<\/li>\n<li><a href=\"https:\/\/career.hadess.io\/skills\">Identity and access management<\/a> \u2014 IAM policies, federation, service accounts, least privilege<\/li>\n<li><a href=\"https:\/\/career.hadess.io\/skills\">Infrastructure as code<\/a> \u2014 Terraform, CloudFormation for secure deployments<\/li>\n<li><a href=\"https:\/\/career.hadess.io\/skills\">Container security<\/a> \u2014 Docker, <a href=\"https:\/\/hadess.io\/kubernetes-security-rbac-network-policies-runtime\/\" title=\"Kubernetes Security: RBAC, Network Policies, and Runtime Protection\">Kubernetes security<\/a>, image scanning<\/li>\n<li><a href=\"https:\/\/career.hadess.io\/skills\">Cloud networking<\/a> \u2014 VPCs, peering, transit gateways, DNS security<\/li>\n<li><a href=\"https:\/\/career.hadess.io\/skills\">Encryption and key management<\/a> \u2014 KMS, HSM, certificate lifecycle<\/li>\n<li><a href=\"https:\/\/career.hadess.io\/skills\">Cloud logging and monitoring<\/a> \u2014 centralized logging, alerting, SIEM integration<\/li>\n<li><a href=\"https:\/\/career.hadess.io\/skills\">Compliance automation<\/a> \u2014 mapping controls to cloud services<\/li>\n<\/ul>\n<p>Explore these in the <a href=\"https:\/\/career.hadess.io\/skills\">skills library<\/a> and trace your progression in the <a href=\"https:\/\/career.hadess.io\/career-skills\">career path explorer<\/a>.<\/p>\n<h2>Certifications<\/h2>\n<p>Cloud security certifications are platform-specific and highly valued:<\/p>\n<ul>\n<li><strong>AWS Security Specialty<\/strong> \u2014 thorough coverage of AWS security services and architecture<\/li>\n<li><strong>Azure Security Engineer Associate (AZ-500)<\/strong> \u2014 Microsoft cloud security<\/li>\n<li><strong>CCSP<\/strong> \u2014 Certified Cloud Security Professional, vendor-neutral<\/li>\n<li><strong>CKS<\/strong> \u2014 Certified <a href=\"https:\/\/hadess.io\/kubernetes-security-specialist\/\" title=\"Kubernetes Security Specialist: Secure Container Orchestration at Scale\">Kubernetes Security Specialist<\/a>, for container-heavy environments<\/li>\n<\/ul>\n<p>Plan your certification sequence with the <a href=\"https:\/\/career.hadess.io\/certificate-roadmap\">certification roadmap planner<\/a>.<\/p>\n<h2>Salary Range<\/h2>\n<p>Cloud security engineers earn between <strong>$70K and $150K<\/strong>. Multi-cloud expertise and infrastructure-as-code skills push compensation higher. Engineers at tech companies and financial institutions regularly exceed this range. This is one of the fastest-growing roles in cybersecurity.<\/p>\n<p>Benchmark your compensation with the <a href=\"https:\/\/career.hadess.io\/salary-calculator\">salary calculator<\/a>.<\/p>\n<h2>How to Get Started<\/h2>\n<p>1. <strong>Learn a cloud platform deeply<\/strong> \u2014 pick AWS, Azure, or GCP and get certified at the associate level first 2. <strong>Learn Terraform<\/strong> \u2014 infrastructure as code is the foundation of modern cloud security 3. <strong>Take the <a href=\"https:\/\/career.hadess.io\/assessment\">skills assessment<\/a><\/strong> to identify your cloud security gaps 4. <strong>Build cloud security labs<\/strong> in the <a href=\"https:\/\/career.hadess.io\/workspace\">workspace<\/a> \u2014 deploy and secure real infrastructure 5. <strong>Study IAM thoroughly<\/strong> \u2014 it is the most common source of cloud security failures 6. <strong>Get AWS Security Specialty or AZ-500<\/strong> \u2014 plan your path with the <a href=\"https:\/\/career.hadess.io\/certificate-roadmap\">certification planner<\/a> 7. <strong>Contribute to open-source cloud security tools<\/strong> \u2014 Prowler, ScoutSuite, Cartography 8. <strong>Build your <a href=\"https:\/\/career.hadess.io\/resume\">resume<\/a><\/strong> with specific cloud security projects and achievements 9. <strong>Search for cloud security engineer roles<\/strong> on the <a href=\"https:\/\/career.hadess.io\/jobs\">job board<\/a><\/p>\n<p>If you are coming from traditional infrastructure security and want to transition to cloud, the <a href=\"https:\/\/career.hadess.io\/coach\">career coach<\/a> can help you identify the fastest path based on your existing skills.<\/p>\n<p><strong>Read the complete guide:<\/strong> <a href=\"https:\/\/hadess.io\/cybersecurity-career-guide\/\" title=\"How to Start a Career in Cybersecurity\">How to Start a Career in Cybersecurity<\/a><\/p>\n<h2>Related Guides in This Series<\/h2>\n<ul>\n<li><a href=\"https:\/\/career.hadess.io\/blog\/career-paths\/cloud-security\/data-security-engineer\">Data Security Engineer: Protect Information at Every Stage<\/a><\/li>\n<\/ul>\n<h2>Take the Next Step<\/h2>\n<p><strong>Start your career assessment.<\/strong> Go to the <a href=\"https:\/\/career.hadess.io\/assessment\">start your career assessment<\/a> on HADESS.<\/p>\n<p><strong>Explore career paths.<\/strong> Check out the <a href=\"https:\/\/career.hadess.io\/career-skills\">explore career paths<\/a>.<\/p>\n<p><strong>Get started free<\/strong> \u2014 <a href=\"https:\/\/career.hadess.io\/login\">Create your HADESS account<\/a> and access all career tools.<\/p>\n<h2>Frequently Asked Questions<\/h2>\n<h3>What certifications do I need for this role?<\/h3>\n<p>Certification requirements vary by employer and seniority level. Use the <a href=\"https:\/\/career.hadess.io\/certificate-roadmap\">certification roadmap planner<\/a> to build a sequence based on your target role and current qualifications.<\/p>\n<h3>What is the salary range for this role?<\/h3>\n<p>Salaries vary significantly by location, experience, and employer type. Use the <a href=\"https:\/\/career.hadess.io\/salary-calculator\">salary calculator<\/a> for your specific market rate.<\/p>\n<h3>How do I transition into this career path?<\/h3>\n<p>Take the <a href=\"https:\/\/career.hadess.io\/assessment\">skills assessment<\/a> to identify your current strengths and gaps relative to this role. The assessment generates a personalized learning plan to close the gap.<\/p>\n<p>&#8212;<\/p>\n<p><em>HADESS Team consists of cybersecurity practitioners, hiring managers, and career strategists who have collectively spent 50+ years in the field.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Security Engineer: Protect Infrastructure at Scale. Skills, career paths, and how to get started on the HADESS platform.<\/p>\n","protected":false},"author":1,"featured_media":9709,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[76],"tags":[80,93,81,79,92,97,94,86,96,90,95,85,77,98],"class_list":["post-9341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-guide","tag-aws","tag-azure","tag-certifications","tag-cloud-security","tag-cybersecurity","tag-docker","tag-gcp","tag-incident-response","tag-kubernetes","tag-resume","tag-salary","tag-siem","tag-soc-analyst","tag-terraform"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud Security Engineer: Protect Infrastructure at Scale - HADESS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hadess.io\/cloud-security-engineer-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security Engineer: Protect Infrastructure at Scale - HADESS\" \/>\n<meta property=\"og:description\" content=\"Cloud Security Engineer: Protect Infrastructure at Scale. Skills, career paths, and how to get started on the HADESS platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hadess.io\/cloud-security-engineer-2\/\" \/>\n<meta property=\"og:site_name\" content=\"HADESS\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-28T14:42:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T18:30:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"hadess\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hadess\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/\"},\"author\":{\"name\":\"hadess\",\"@id\":\"https:\/\/hadess.io\/#\/schema\/person\/9546e2936eef03fd307e0d4b96eab4a7\"},\"headline\":\"Cloud Security Engineer: Protect Infrastructure at Scale\",\"datePublished\":\"2026-02-28T14:42:58+00:00\",\"dateModified\":\"2026-04-06T18:30:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/\"},\"wordCount\":771,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png\",\"keywords\":[\"AWS\",\"Azure\",\"Certifications\",\"Cloud Security\",\"Cybersecurity\",\"Docker\",\"GCP\",\"Incident Response\",\"Kubernetes\",\"Resume\",\"Salary\",\"SIEM\",\"SOC Analyst\",\"Terraform\"],\"articleSection\":[\"Career Guide\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/hadess.io\/cloud-security-engineer-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/\",\"url\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/\",\"name\":\"Cloud Security Engineer: Protect Infrastructure at Scale - HADESS\",\"isPartOf\":{\"@id\":\"https:\/\/hadess.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png\",\"datePublished\":\"2026-02-28T14:42:58+00:00\",\"dateModified\":\"2026-04-06T18:30:44+00:00\",\"author\":{\"@id\":\"https:\/\/hadess.io\/#\/schema\/person\/9546e2936eef03fd307e0d4b96eab4a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hadess.io\/cloud-security-engineer-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/#primaryimage\",\"url\":\"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png\",\"contentUrl\":\"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png\",\"width\":2400,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hadess.io\/cloud-security-engineer-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hadess.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Career Guide\",\"item\":\"https:\/\/hadess.io\/category\/career-guide\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cloud Security Engineer: Protect Infrastructure at Scale\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hadess.io\/#website\",\"url\":\"https:\/\/hadess.io\/\",\"name\":\"HADESS\",\"description\":\"Cyber Security Knowledge Hub\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hadess.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/hadess.io\/#\/schema\/person\/9546e2936eef03fd307e0d4b96eab4a7\",\"name\":\"hadess\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/34bea988a8bf817b77554a8a768058aa93427b6e9e5c53a9fb4273ea554b12e5?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34bea988a8bf817b77554a8a768058aa93427b6e9e5c53a9fb4273ea554b12e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34bea988a8bf817b77554a8a768058aa93427b6e9e5c53a9fb4273ea554b12e5?s=96&d=mm&r=g\",\"caption\":\"hadess\"},\"sameAs\":[\"https:\/\/hadess-127191vg6c.live-website.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security Engineer: Protect Infrastructure at Scale - HADESS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hadess.io\/cloud-security-engineer-2\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security Engineer: Protect Infrastructure at Scale - HADESS","og_description":"Cloud Security Engineer: Protect Infrastructure at Scale. Skills, career paths, and how to get started on the HADESS platform.","og_url":"https:\/\/hadess.io\/cloud-security-engineer-2\/","og_site_name":"HADESS","article_published_time":"2026-02-28T14:42:58+00:00","article_modified_time":"2026-04-06T18:30:44+00:00","og_image":[{"width":2400,"height":1260,"url":"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png","type":"image\/png"}],"author":"hadess","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hadess","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/#article","isPartOf":{"@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/"},"author":{"name":"hadess","@id":"https:\/\/hadess.io\/#\/schema\/person\/9546e2936eef03fd307e0d4b96eab4a7"},"headline":"Cloud Security Engineer: Protect Infrastructure at Scale","datePublished":"2026-02-28T14:42:58+00:00","dateModified":"2026-04-06T18:30:44+00:00","mainEntityOfPage":{"@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/"},"wordCount":771,"commentCount":0,"image":{"@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/#primaryimage"},"thumbnailUrl":"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png","keywords":["AWS","Azure","Certifications","Cloud Security","Cybersecurity","Docker","GCP","Incident Response","Kubernetes","Resume","Salary","SIEM","SOC Analyst","Terraform"],"articleSection":["Career Guide"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hadess.io\/cloud-security-engineer-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/","url":"https:\/\/hadess.io\/cloud-security-engineer-2\/","name":"Cloud Security Engineer: Protect Infrastructure at Scale - HADESS","isPartOf":{"@id":"https:\/\/hadess.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/#primaryimage"},"image":{"@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/#primaryimage"},"thumbnailUrl":"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png","datePublished":"2026-02-28T14:42:58+00:00","dateModified":"2026-04-06T18:30:44+00:00","author":{"@id":"https:\/\/hadess.io\/#\/schema\/person\/9546e2936eef03fd307e0d4b96eab4a7"},"breadcrumb":{"@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hadess.io\/cloud-security-engineer-2\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/#primaryimage","url":"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png","contentUrl":"https:\/\/hadess.io\/wp-content\/uploads\/2026\/02\/hadess-cloud-security-engineer-2.png","width":2400,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/hadess.io\/cloud-security-engineer-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hadess.io\/"},{"@type":"ListItem","position":2,"name":"Career Guide","item":"https:\/\/hadess.io\/category\/career-guide\/"},{"@type":"ListItem","position":3,"name":"Cloud Security Engineer: Protect Infrastructure at Scale"}]},{"@type":"WebSite","@id":"https:\/\/hadess.io\/#website","url":"https:\/\/hadess.io\/","name":"HADESS","description":"Cyber Security Knowledge Hub","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hadess.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/hadess.io\/#\/schema\/person\/9546e2936eef03fd307e0d4b96eab4a7","name":"hadess","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/34bea988a8bf817b77554a8a768058aa93427b6e9e5c53a9fb4273ea554b12e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/34bea988a8bf817b77554a8a768058aa93427b6e9e5c53a9fb4273ea554b12e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34bea988a8bf817b77554a8a768058aa93427b6e9e5c53a9fb4273ea554b12e5?s=96&d=mm&r=g","caption":"hadess"},"sameAs":["https:\/\/hadess-127191vg6c.live-website.com"]}]}},"_links":{"self":[{"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/posts\/9341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/comments?post=9341"}],"version-history":[{"count":3,"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/posts\/9341\/revisions"}],"predecessor-version":[{"id":10026,"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/posts\/9341\/revisions\/10026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/media\/9709"}],"wp:attachment":[{"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/media?parent=9341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/categories?post=9341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hadess.io\/wp-json\/wp\/v2\/tags?post=9341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}