1
RUNNING HEAD: CYBERSECURITY CAREER EXPLORATION
Cybersecurity Career Exploration
John E. Fox
Harrison High School
03 March 2021
2
CYBERSECURITY CAREER EXPLORATION
Chapter 1: Career Choice 3
Introduction 3
Job Description 4
A Day in The Life 5
A Day in The Life 7
Pros and Cons 8
Chapter 2: From Here to There 9
Professional Profile 9
Education 10
Budgeting 11
Chapter 3: Personal Assessment 12
My Skills 12
My Personality 13
My Motivation 14
Chapter 4: Productivity 16
My Project 16
Career Connection 18
References 20
3
CYBERSECURITY CAREER EXPLORATION
Chapter 1: Career Choice
Introduction
There are thousands of different careers in the country; some professions were created
yesterday, while others have been around since the country's creation. I chose to research a
relatively new career, cybersecurity. I initially decided on this career after a conversation with
my dad, a financial advisor, about one of his clients. His client works in cybersecurity, and we
discussed how the field is growing and that there is no fear of it going away. I began thinking
about cybersecurity and whether or not I wanted to do this career. Along with discussions with
my dad, another factor in my decision was the class computer science. I remembered taking the
class during my junior year, and I thoroughly enjoyed it. It was mainly basic level coding, but the
projects we coded throughout the course were very interesting. Thus, I decided to research the
career for my career exploration.
Through my research, I realized many aspects of this career intrigue me. The career takes
critical thinking and problem-solving skills, both of which are reasons math is my favorite
subject. It also involves computers and technology; I have always been interested in computers
and have never had a class about them that I didn't like. Some of my favorite courses, such as
graphic design and computer science, center around computers. I also discovered many values
that I share with the occupation. As I previously mentioned, problem-solving and critical
thinking are two of the values most important to the career, as well as diligence and
communication. I have learned through working during high school the importance of these two
values in any job.
I gained further interest in the career when, during my preliminary research, we
participated in a career interest assessment. Among the top of my careers of interest were
4
CYBERSECURITY CAREER EXPLORATION
architectural engineer, biofuels and biodiesel product managers, chemical engineers, and
computer and information system managers. Seeing careers in the computer science and
cybersecurity field cemented my belief that I have similar values and interests to the career.
Widening the scope, however, all of the careers shown are math-heavy engineering careers. The
results make sense being that math is my favorite subject. They all involve high levels of
communication, problem-solving skills, and critical thinking skills. All of the aspects of
cybersecurity that interested me were shared among these careers. At that point, I knew without a
doubt that cybersecurity would be the career that I researched.
Job Description
Throughout the field of cybersecurity, there are many different jobs that an individual
could have. One of the prominent careers in the field of cybersecurity would be a cybersecurity
analyst. Cybersecurity analysts are prevalent in both the private sector and public sector.
Companies need their data protected and often hire outside consulting companies or have their
own analysts to ensure security. The government also employs many analysts to protect the data
of the government and ensure privacy. A cybersecurity analyst works with companies, the
government, or individuals to monitor security access, perform tests and diagnostics, and identify
and solve security breaches. They also run "security audits" for companies to determine possible
weak areas in security. The average salary would be between $70,000 and $120,000 a year, as
well as many common benefits such as 401K matching and insurance. The job is a newer job,
and with the advancements in technology, it has and continues to grow rapidly. In cybersecurity,
there has been a 0% unemployment rate since 2011 (Professional Profile 1, 2021).
As with any job, there are many different skills required to be successful in the career.
Some of the most critical soft skills are communication, diligence, problem-solving, and
5
CYBERSECURITY CAREER EXPLORATION
organization. Hard skills associated with the job include knowledge of network information
systems and security, programming and coding, penetration testing, and a multitude of other
skills. There are also many personality traits that can help a person be successful throughout their
career in cybersecurity. There are traits that can help a person be successful in any job, such as
being hardworking and cooperative, as well as traits that are more specific to the career, such as
being intuitive and detailed oriented. While interviewing a man in the cybersecurity field, he
stated that one of the most beneficial traits is having a "natural curiosity" (Transcript A, 2021).
He discussed that one of the most important things is to simply have a thirst for knowledge.
Always ask questions and try to learn as much as you can about a topic. Natural curiosity will
not only make you more knowledgeable but will also show the people above you that you care
about your job and are putting in extra effort to do it correctly. However, skills can only get you
so far; certain requirements and expectations are also included in the job. A person in the job is
expected to not only have these skills but also be able to continuously use them to protect client's
data as well as possible. The job requires you to combine all of these skills into your daily
routine to be successful.
A Day in The Life
During an average day in cybersecurity, I could be doing many different things. As the
job mainly works with computers, I would mostly be in an office setting. I will be doing many
different things throughout the day. I will be preparing and analyzing security and network
systems for various clients and identifying weaknesses to strengthen security. I could be running
diagnostic tests or creating new protocols. I must perform these tasks well, and often as many
people rely on the company to secure their data. One mistake could lead to data being leaked or
stolen, so it is imperative to be diligent and thorough. However, the job is just as much about
6
CYBERSECURITY CAREER EXPLORATION
people as it is computers. The purpose of cybersecurity is to secure people's data. Most people in
cybersecurity work within a team as well. This means lots of interaction with people. It could be
meeting with the rest of your team or going to meet with clients or potential clients to discuss
their security needs. As Michael Kelley stated in his interview, "Normally on a Thursday, I
wouldn't be sitting here in the home office. Right. I would be out, um, visiting my, you know,
people or customers or our partners" (Transcript A, 2021).
Many aspects of the job intrigue me. I enjoy working with computers, but I also enjoy
talking to others, and I feel that I am a people person. I enjoy working in teams and cooperating.
However, I also enjoy the troubleshooting and problem-solving aspect associated with
cybersecurity. As I stated before, the job is just as much about people as computers, making it
stand out in my opinion. One very enticing factor of the job is the pay and benefits. While
discussing with Mr. Kelley, he stated, "a graduate coming out of Georgia Tech, you know, would
make over a hundred thousand dollars as a starting employee. And um, in addition to that and
have some stock compensation and all the benefits, it's pretty inviting" (Transcript A, 2021).
Along with the salary being very competitive, the job also comes with many benefits such as
401k matching.
As with everything in life, there are also negatives associated with the job.
One of the main negatives is a person has the potential to be on call throughout the day and
night. It's a very realistic situation that "you go home, leave the office and you go home, but you
know, at any minute you could be called into a problem, and you might have to stay overnight"
(Transcript B, 2021). I think that this is a definite negative to the job as it could cause stress.
However, it is necessary because criminals work at all hours of the day, and anyone could try to
hack into a company's or the government's networks at any time.
7
CYBERSECURITY CAREER EXPLORATION
A Day in The Life
During an average day in cybersecurity, I could be doing many different things. As the
job mainly works with computers, I would mostly be in an office setting. I will be doing many
different things throughout the day. I will be preparing and analyzing security and network
systems for different clients and identifying weaknesses to help strengthen security. I could be
running diagnostic tests or creating new protocols. I must perform these tasks well and often as
there are many people that rely on the company to secure their data. One mistake could lead to
data being leaked or stolen so it is very important to be diligent and thorough. However, the job
is just as much about people as it is computers. The purpose of cybersecurity is to secure
people’s data. Most people in cybersecurity work within a team as well. This means lots of
interaction with people. It could be meeting with the rest of your team or going to meet with
clients or potential clients to discuss their security needs. As Michael Kelley stated in his
interview “Normally on a Thursday, I wouldn't be sitting here in the home office. Right. I would
be out, um, visiting my, you know, people or customers or our partners” (Transcript A, 2021).
Many aspects of the job intrigue me. I enjoy working with computers, but I also enjoy talking to
others and I feel that I am a people person. I enjoy working in teams and cooperating. However, I
also enjoy the troubleshooting and problem-solving aspect associated with cybersecurity. As I
stated before the job is just as much about people as it is computers and that makes it stand out in
my opinion. One very enticing factor of the job is the pay and benefits. While discussing with
Mr. Kelley, he stated “a graduate coming out of Georgia tech, you know, would make over a
hundred thousand dollars as a starting employee. And um, in addition to that and have some
8
CYBERSECURITY CAREER EXPLORATION
stock compensation and all the benefits, it's pretty inviting,” (Transcript A, 2021). Along with
the salary being very competitive the job also comes with many benefits such as 401k matching.
As with everything in life, there are also negatives associated with the job.
One of the main negatives is a person has the potential to be on call throughout the day
and night. It's a very realistic situation that “you go home, leave the office and you go
home, but you know, at any minute you could be called into a problem and you might
have to stay overnight” (Transcript B, 2021). I think that this is a definite negative to the
job as it could cause stress. However, it is necessary because criminals work at all hours
of the day and anyone could try to hack into a company’s or the government’s networks
at any time.
Pros and Cons
There are many aspects, both positive and negative, that influence the career of
cybersecurity. Starting with the negative elements of the career, one of the main negatives of
this career would be the commitment required. As I previously stated, there are many times
throughout the job that a person would be on call or have to stay late. It could be “two in the
morning and then [you] get a phone call and [you] have to get back into work” (Transcript B,
2021). This is because a security breach could happen at any time throughout the day. Another
negative aspect is that it can be fairly stressful. Your job is to secure data and information for
companies, individuals and even the government. This can create a lot of stress as there are many
people depending on you and your work. This manufactures a lot of pressure for your work to be
perfect. Finally, the job is constantly evolving so it is very easy to become unfamiliar or out of
touch with new techniques. It is very important to stay up to date in the field because it is
constantly changing.
9
CYBERSECURITY CAREER EXPLORATION
However, I believe that the positive aspects outshine the negative aspects. First, the job
has one of the best outlooks of any careers as it does not only have no unemployment, but it also
is projected to continue its growth. Mr. Kelley said it best when he said, “we're growing like
crazy,” (Transcript A, 2021). The internet is not going anywhere, and everyone wants their
personal information to be safe. Another positive to the cybersecurity field is that there are many
different jobs and routes to go into the field. There are different focuses a person could have. For
example, at Georgia Institute of Technology there are 3 different bachelor's degrees that a person
can have to get a masters in cybersecurity. They can get a bachelor’s in computer science,
computer engineering, or public policy. Along with different paths to take there are also many
certifications one can get, some company specific, some for any company, that can help a person
stand out.
Chapter 2: From Here to There
Professional Profile
Throughout the career of cybersecurity, there are many things in which the professionals
of the career have in common. Certain personality traits and qualities a person could have would
influence them to pursue cybersecurity. As with many jobs, someone pursuing a career in
cybersecurity needs to be diligent and hardworking. However, this is even more so throughout
cybersecurity as there are new problems constantly arriving. Often, throughout a person’s career,
they will be on call and may have to come into work at any time of the day or week. More
specific to the job of cybersecurity, a person must be organized and detail-oriented. Much of the
job requires troubleshooting and solving problems. Many problems occur because of the tiniest
of details. It requires someone that is very detail-oriented and organized to work through the
whole system and identify potential issues and how to solve them. Finally, one of the most
10
CYBERSECURITY CAREER EXPLORATION
important traits a person can have would be the ability to work in a team. People in the career
often work in groups for specific tasks or clients. Working in a group requires a person to be
cooperative and communicative.
Along with personality traits many share in the job, some attributes can give one a leg up
over the rest. One of the most beneficial things one can be is to be personable and helpful. While
it may sound obvious, it is truly one of the most critical aspects of the job. Throughout
cybersecurity, a person will be dealing with their team and clients at all times. When asked what
qualities have aided the most throughout his career, Mr. Abernathy stated,” my top quality is I
can pretty much get along with anyone” (Transcript B, 2021). Through being personable, one
can set them apart from others in the job, which will allow them to move up through the field
faster.
Education
There are many different ways to enter the career of cybersecurity. However, all of them require
education. Many employers look for workers with a bachelor’s degree in cybersecurity or a
bachelor’s degree in computer science. Most colleges offer a bachelor’s degree in computer
science. While fewer colleges offer a bachelor’s degree in cybersecurity, many offer a master’s
degree. A person can take many different routes throughout schooling; as previously discussed, a
person at Georgia Tech can receive one of 3 different bachelor’s degrees and earn a master’s
degree in cybersecurity. Other than a degree in cybersecurity, there are certifications that can
help an individual stand out. While it is not required, many employers like to see potential
employees that have certifications. Some standard certificates are certified information systems
security professional (CISSP), certified information systems auditor (CISA), and certified
11
CYBERSECURITY CAREER EXPLORATION
information security manager (CISM). While these certifications are most common, there are
other certifications, including certifications geared towards specific companies.
Along with certifications, education throughout one’s career is almost as important as the
education received during one’s career. Cybersecurity is a field that is constantly evolving. New
technologies and procedures come out every day. It is vital to keep up with news on
cybersecurity and keep oneself well versed in new methods that may come about. Once you
obtain a job in cybersecurity, there are many different paths you can take within the field. The
field exists in multiple different ways. Your job could be working for the government, or you
could be a consultant for a company, or even work for the company itself. There are many
different careers, including network architects, security analysts. There are also companies where
you could go into the sales side of the business and sell your company’s work to other companies
or people. Cybersecurity is an expansive and ever-growing field, and this creates many different
options for education and advancement throughout one’s career.
Budgeting
Throughout life, there are always expenses that arise. Budgeting is essential so people
can afford their current arrangements and have the ability to save money for emergencies. While
researching this career, in “Professional Profile #4” I performed a budget analysis based on the
baseline salary. In the study, the assumed amount of student debt accumulated after college was
$22,350, and the baseline level salary was $58,430 before taxes. After performing this analysis
and through interviews, I believe it is most definitely worth entering this career. While a starting
salary of $58,000 is not stellar, it is still more than many jobs make and is enough for an
individual. Most importantly, in the career of cybersecurity, it is low risk, high reward. One of
the things everyone looks for in a job.
12
CYBERSECURITY CAREER EXPLORATION
First, despite $58,000 being a baseline salary, there is a lot of growth potential throughout
the field, giving this job a high reward. Michael Kelley discussed that “a graduate coming out of
Georgia Tech, you know, would make over a hundred thousand dollars” (Interview A, 2021).
Kelley’s statements accentuate a substantial amount of possible growth. There are also excellent
benefits that many companies offer that can help cut expenses allowing you to save more of your
salary, exemplifying the high reward nature of the career.
The other aspect that makes the job enticing is a low risk. As discussed previously, the
job has been growing and is projected to continue its growth in the foreseeable future. Along
with the growth, there has been a steady trend of 0% unemployment throughout the field, which
means more jobs present than people to fill them (Professional Profile #1). The excess of
employment creates a low-risk environment as you do not have a fear of not being able to find a
job for months after college or not being able to find one at all.
The state of the career in our country is very promising and has a high payoff when
pursuing this career throughout college. Based on the potential growth throughout the job and the
lower risk of going unemployed associated with this job than others, it is clear that going into
cybersecurity is much more than “worth it”.
Chapter 3: Personal Assessment
My Skills
I have previously discussed the skills necessary to not only succeed but excel in the field
of cybersecurity. Now I am going to focus on myself and the skills I possess and how they relate
to the field of cybersecurity. I believe one of the main skills I possess that relates to the career is
that I am detail-oriented and a good problem solver. These are very important in the field of
cybersecurity. Much of the job deals with solving problems in the network or discovering and
13
CYBERSECURITY CAREER EXPLORATION
stopping breaches. These take strong problem-solving skills, which I believe is one of my strong
suits. Secondly, many of these problems occur because of the smallest mistakes or oversights
within the network. A detail-oriented person is better suited to discover these problems and be
able to fix them in a timely manner. I believe that I am a detail oriented and observant person
which will help me throughout the career. Another strong suit of mine is that I am a strong
cooperator and communicator. I am very social and enjoy working in groups. This is helpful as
often in the career one would work with a group of analysts. However, I am not a perfect person,
and I know that. I have many weaknesses that I need to work on. A few weaknesses I have that
are related to this career are that I am not organized, and I am not a preplanner. This can create
problems as one needs to be very organized in order to have the ability to find problems that
could be happening in a clear and quick manner. While I am detail oriented once I start doing
something I am not very organized before I start something. This could cause problems.
Secondly, I am not the best planner. I have never really been one to plan things, I just go with the
flow. This can also generate problems as it is very beneficial to go into creating new procedures
for performing an audit with a plan. This ensures consistency and minimizes mistakes and
oversights. However, both of these weaknesses are something that I can work on and develop as
skills throughout college to set myself up for success in my career. While it is clear that I do not
possess all of the necessary skills and I do have some weaknesses. I believe that I have a strong
set of skills and can develop other skills which can help me on my path throughout my career.
My Personality
I believe that my personality goes very well with this career. I believe that I am
extroverted as well as levelheaded, and factual. These are all helpful to the career as there is lots
of cooperation and discussion with others throughout the field. It is important to be levelheaded
14
CYBERSECURITY CAREER EXPLORATION
as there can be a lot of pressure and stress associated with the job. Level-headedness can ensure
that my work is accurate and timely even in times of stress. I am also factual; I am a logical and
critical person, and this will help me to make educated and beneficial decisions as well as create
strong networks. These attributes are reinforced through my results in the Myers Briggs
personality test. Through the test, I discovered that my personality is ESTP-A. This means that I
am mostly extroverted, observant, thinking and prospective. Along with my personality, I have a
learning style that is beneficial to cybersecurity. I am more of a tactile learner; I learn best from
experience. This is beneficial in the field as many of the certifications and learning is based on
experience and being able to perform the actions necessary. Much of the career is also based in
math and technology, which lines up with the skills that I have in school. My best and favorite
subject in school is math. Computer science includes a lot of math which is beneficial to me.
Other classes which were favorites of mine included technology. Graphic design and Computer
science are two examples which rely heavily on using computers and programs to perform tasks.
Through my research I have discovered just how well this career and my personality match. In
“Reflective Assignment 4: SWOT Analysis” I took a career assessment. Computer system
analyst, network architects and computer systems information manager were among my top
matches. While learning more about this career, I have also discovered just how many
personality traits I have which can help me throughout the job. I believe this job is a great match
for me and I can lead a successful career in the field.
My Motivation
My motivation to enter this career has flourished as I have researched more about
cybersecurity. I began this research unsure about the career but I was interested and wanted to
discover more. Through the research I discovered how similar the aspects of the career, and my
15
CYBERSECURITY CAREER EXPLORATION
skills and interest were. This realization confirmed my interest in the career and has led to me
being very confident in this career. Since I am confident this is what I want to do it is now
important to look to the future. I am attending the Georgia Institute of Technology. In school I
will major in computer science and then proceed to major in cybersecurity. This could
potentially present a problem with the extra cost of gaining a master’s degree but I believe
through scholarships and work opportunities I should be able to overcome this obstacle. While
attending college there are many things I could do to gain experience in the field. Through
Georgia Tech they have Co-Op programs where I can work for a company in cybersecurity while
learning. This would give me on the job experience as a graduate and would help pay for school
as you get paid in the Co-Ops. After college there are many different companies that I could
work for. The larger companies that I could possibly end up working for would be Palo Alto
Networks, IBM, Microsoft and others. However, there are companies located throughout the US.
Depending on the company there is a chance I would need to move but I would not necessarily
have to move depending on the company I was hired at.
I have also developed many skills through this class and researching this career. I have
learned valuable research and self-evaluation skills. Assignment such as the SWOT Analysis
helped me identify weaknesses and things that I needed to work on. I also developed research
skills through researching many different topics throughout the semester. Along with the
research in the class we also performed a physical product. My physical product which I will
explain in the next chapter was heavily coding based. This helped reinforce the coding
experience which I had gained throughout high school. This class has not only provided me with
many opportunities to learn about cybersecurity but also many skills that can help me in my
future.
16
CYBERSECURITY CAREER EXPLORATION
Chapter 4: Productivity
My Project
Throughout the semester, I worked on a project related to the career I researched. After
weeks of brainstorming, I decided to create a game that could teach people about personal
cybersecurity and how to keep your information safe on the internet. The game combines coding,
which is a significant part of cybersecurity, and teaching people more about cybersecurity and
how they can protect themselves.
0- 1 Figure 4.2: Example of a question asked in game
To
create this
project, I
broke up
the 0-2 Figure 4.1: Beginning of the maze from a birds-eye view
work
17
CYBERSECURITY CAREER EXPLORATION
into stages. First, the design phase was the longest and most arduous step in creating my game.
However, it is also the most important. Without a functioning base code, there is no game. I
began the project by creating the main code for the game and testing it to ensure it functioned
properly. I used a program called Alice 3 which uses basic
programming to create games and animated movies. I
chose this program as I had previously had experience
with it in my computer science class. My project went
through two different designs. The original version was
more complex and had more moving parts. However, after
working on this design for some time, I realized that the game was too complex, and the Alice
program could not handle it. So, I shifted to what is now my final project. I simplified the
procedure to make sure that Alice could run it properly. While still a question-and-answer game,
the final design takes place in a maze. The simpler setting creates a much simpler design as there
are far fewer moving parts and background information being processed. Next, I moved on to the
research phase. I researched personal cybersecurity and techniques to keep data safe on the
internet. After studying different techniques, strategies, common scams, and other general info, I
began to design questions. I included a multitude of questions as the game draws randomly from
a pool of questions. After designing and researching, I moved onto the final stage of my game
implementation. During the design phase, I used placeholder questions for the procedure. After
my research, I inserted the questions into the procedure and then ran some final tests to ensure
effectiveness. This stage was relatively simple as I already had the structure of the code. I simply
copied the questions into the right areas of the code.
18
CYBERSECURITY CAREER EXPLORATION
The game functions mainly based on user input. When the game is started, there is a
message for the user to wait a few seconds. This delay provides
time for the game to boot up and ensure it runs properly. After
about ten seconds, the game will start, and the player can move
the data using the arrow keys. When the player enters an
intersection in the maze, a question will appear. The answers
will display a letter corresponding to a note on the keyboard,
that when pressed, will take the skeletons down a particular 0- 3 Figure
4.3: Code controlling
player movements using arrow keys
path of the maze. If the player chooses an incorrect answer,
they will hit a wall and see a sign telling them to restart. If the player is correct, they will
continue until they come to the next intersection, where the process will repeat. If they get all the
questions correct, they will enter a room that gives them a congratulatory statement. The user can
then exit the game or restart if they choose to play again.
The final game was mostly a success. The game has plenty of questions, so it rarely will
repeat questions in a single game and is easy to download off of the website I created for the
game. I have encountered zero problems in the downloading portion of the game. I have,
however, experienced a couple of minor issues with the product. As I previously stated, my
original project was very complex, and the Alice program had a hard time running the game.
While I did simplify the game, it is still quite complicated and can sometimes cause problems.
The majority of the time, the game will run smoothly; however, it will sometimes produce an
error statement from the Alice program due to its complexity. However, if this happens, it can
easily be solved by restarting the program in the top middle toolbar in the app.
19
CYBERSECURITY CAREER EXPLORATION
Career Connection
There are many different aspects from the career of cybersecurity from which I could
have drawn inspiration. I decided to create a game as it draws together a few various aspects of
cybersecurity. One of the most essential aspects of cybersecurity, as well as my project, is
coding. Throughout cybersecurity, workers need to create or analyze networks, introduce new
procedures or stop cyberattacks. All of these require extensive knowledge of coding. While
creating a game does not require as many skills as these professionals have, it still incorporates a
significant aspect of cybersecurity. Another aspect of cybersecurity that I incorporated into the
game is personal cybersecurity. Personal cybersecurity is something that not only cybersecurity
professionals deal with but every person that owns a phone, computer, or other piece of
technology. Another aspect I decided to include in my project is personal cybersecurity. I chose
personal cybersecurity for a couple of reasons. First, I wanted the game to be accessible to as
many people as possible. Personal cybersecurity is the most widespread topic in cybersecurity as
it applies to everyone. Second, people are generally horrible at personal cybersecurity. Studies
have shown that 59% of people will use the same password for almost all of their accounts
(Anderson 2018). With more people than ever having extensive computer knowledge and data
being less safe than ever, it is of utmost importance that people learn the best ways to protect
their data online. The importance of personal cybersecurity for everyone throughout the world
and the emphasis on coding throughout cybersecurity led me to create my personal cybersecurity
game.
20
CYBERSECURITY CAREER EXPLORATION
21
CYBERSECURITY CAREER EXPLORATION
References
Anderson, B. (2018, August 29). In the Age of the Data Breach, Why Do We Still Use Bad
Passwords? Security boulevard. https://securityboulevard.com/2018/08/in-the-age-of-
the-data-breach-why-do-we-still-use-bad-passwords/
Fox, J. (2021). Professional Profile #1 Career Overview [Unpublished manuscript]. Harrison
High School.
Fox, J. (2021). Professional Profile #3 Part 2 Transcript A [Unpublished manuscript]. Harrison
High School.
Fox, J. (2021). Professional Profile #3 Part 2 Transcript B [Unpublished manuscript]. Harrison
High School.
Fox, J. (2021). Professional Profile #3 Synthesis Matrix [Unpublished manuscript]. Harrison
High School.
Fox, J. (2021). Professional Profile #4 Post College Annual Budget [Unpublished manuscript].
Harrison High School.
Fox, J. (2021). Reflective Exercise #4 Self-Assessment with SWOT Analysis [Unpublished
manuscript]. Harrison High School.
Your Results. (n.d.). Free personality test, type descriptions, relationship and career advice
16Personalities. https://www.16personalities.com/profile