Digital Forensics Analysts
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
30 alternate job titles:
Salary Information
Digital Forensics Analysts: $108,970 (median) per year.
Starting salary (10th percentile).
Required expreience: Varies by Company
Data source: U.S. Bureau of Labor Statistics
Daily Tasks & Responsibilities
| Task Description | Category |
|---|---|
| Monitor the security of digital information. | Maintenance |
| Maintain computer equipment or software. | Maintenance |
| Maintain knowledge of laws or regulations. | Maintenance |
| Maintain records, documents, or other files. | Maintenance |
| Examine records or other types of data to investigate criminal activities. | General |
| Compile technical information or documentation. | General |
| Plan production or operational procedures or sequences. | General |
| Establish operational policies. | General |
| Record images needed to address work issues. | General |
| Identify information technology project resource requirements. | General |
| Provide recommendations to others about computer hardware. | General |
| Recommend changes to improve computer or information systems. | General |
| Translate information for others. | General |
| Write computer programming code. | General |
| Enter codes or other information into computers. | General |
| Write reports or evaluations. | General |
| Testify at legal or legislative proceedings. | General |
| Analyze security of systems, network, or data. | Analysis |
| Analyze traffic data. | Analysis |
| Develop technical methods or processes. | Development |
Technology Requirements
| Technology | Description |
|---|---|
| Amazon Web Services AWS software | Data base user interface and query software |
| Structured query language SQL | Data base user interface and query software |
| Microsoft Access | Data base user interface and query software |
| ServiceNow | Data base user interface and query software |
| Slack | Cloud-based data access and sharing software |
| Platform as a service PaaS | Cloud-based data access and sharing software |
| Linux | Operating system software |
| Microsoft Azure software | Development environment software |
| Microsoft Office software | Office suite software |
| Microsoft PowerPoint | Presentation software |
| Microsoft PowerShell | Development environment software |
| Python | Object or component oriented development software |
| Splunk Enterprise | Enterprise system management software |
| UNIX | Operating system software |
| Amazon Simple Storage Service S3 | Storage networking software |
| Ansible software | Expert system software |
| Apple iOS | Operating system software |
| Apple macOS | Operating system software |
| Bash | Operating system software |
| Border Gateway Protocol BGP | Switch or router software |
| C | Development environment software |
| C# | Object or component oriented development software |
| C++ | Object or component oriented development software |
| Extensible markup language XML | Enterprise application integration software |
| Go | Development environment software |
| Google Workspace software | Office suite software |
| Hypertext markup language HTML | Web platform development software |
| IBM Terraform | Configuration management software |
| JavaScript | Web platform development software |
| Kubernetes | Application server software |
| Microsoft Active Directory | Internet directory services software |
| Microsoft Excel | Spreadsheet software |
| Microsoft Windows | Operating system software |
| Microsoft Windows Server | Operating system software |
| Oracle Java | Object or component oriented development software |
| PHP | Web platform development software |
| Perl | Object or component oriented development software |
| R | Object or component oriented development software |
| Ruby | Development environment software |
| Firewall software | Network security and virtual private network VPN equipment software |
| Guidance Software EnCase Enterprise | Analytical or scientific software |
| MITRE ATT&CK software | Program testing software |
| Operating system software | Operating system software |
| AccessData FTK | Network monitoring software |
| Cisco Systems Cisco NetFlow Collection Engine | Network monitoring software |
| Computer forensic software | Filesystem software |
| Enterprise application integration EAI software | Enterprise application integration software |
| Graphical user interface GUI design software | Graphical user interface development software |
| IBM QRadar SIEM | Network monitoring software |
| Intrusion detection system IDS | Network security or virtual private network VPN management software |
| Kali Linux | Program testing software |
| Management information systems MIS | Enterprise resource planning ERP software |
| Metasploit | Transaction security and virus protection software |
| Microsoft Defender Antivirus | Transaction security and virus protection software |
| Network directory services software | Internet directory services software |
| OpenVAS | Transaction security and virus protection software |
| Portswigger BurP Suite | Transaction security and virus protection software |
| Security assertion markup language SAML | Web platform development software |
| Single sign-on SSO | Authentication server software |
| Snort | Network monitoring software |
| System testing software | Program testing software |
| Tenable Nessus | Transaction security and virus protection software |
| Web server software | Transaction server software |
| Wireshark | Network monitoring software |
| Geographic information system GIS systems | Geographic information system |