Digital Forensics Analysts

Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.

30 alternate job titles:

Cyber Analyst Cyber Digital Forensics Cyber Digital Media Analyst Cyber Forensics Analyst Cyber Threat Analyst Cyber Threat Hunter Cyber Threat Intelligence Analyst Cybersecurity Analyst (Cyber) Cybersecurity Engineer (Cyber) Cybersecurity Incident Response Analyst (Cyber) Cybersecurity Specialist (Cyber) Digital Analyst Digital Computer Analyst Digital Cyber Analyst Digital Forensic Analyst Digital Forensic Examiner Digital Forensics Analyst Digital Investigator Digital Media Analyst Incident Responder Incident Response Analyst Information Technology Security Analyst (IT Security Analyst) IT Analyst (Information Technology Analyst) Law Enforcement Counterintelligence Forensics Analyst Legal Digital Analyst Malware Analyst Offensive Security Engineer Operations Analyst Security Analyst Threat Intelligence Analyst
Scroll for more
Salary Information

Digital Forensics Analysts: $108,970 (median) per year.

Starting salary (10th percentile).
Required expreience: Varies by Company


Data source: U.S. Bureau of Labor Statistics

Daily Tasks & Responsibilities

Task Description Category
Monitor the security of digital information. Maintenance
Maintain computer equipment or software. Maintenance
Maintain knowledge of laws or regulations. Maintenance
Maintain records, documents, or other files. Maintenance
Examine records or other types of data to investigate criminal activities. General
Compile technical information or documentation. General
Plan production or operational procedures or sequences. General
Establish operational policies. General
Record images needed to address work issues. General
Identify information technology project resource requirements. General
Provide recommendations to others about computer hardware. General
Recommend changes to improve computer or information systems. General
Translate information for others. General
Write computer programming code. General
Enter codes or other information into computers. General
Write reports or evaluations. General
Testify at legal or legislative proceedings. General
Analyze security of systems, network, or data. Analysis
Analyze traffic data. Analysis
Develop technical methods or processes. Development
Showing 1 to 10 of 0 entries

    Technology Requirements

    Technology Description
    Amazon Web Services AWS software Data base user interface and query software
    Structured query language SQL Data base user interface and query software
    Microsoft Access Data base user interface and query software
    ServiceNow Data base user interface and query software
    Slack Cloud-based data access and sharing software
    Platform as a service PaaS Cloud-based data access and sharing software
    Linux Operating system software
    Microsoft Azure software Development environment software
    Microsoft Office software Office suite software
    Microsoft PowerPoint Presentation software
    Microsoft PowerShell Development environment software
    Python Object or component oriented development software
    Splunk Enterprise Enterprise system management software
    UNIX Operating system software
    Amazon Simple Storage Service S3 Storage networking software
    Ansible software Expert system software
    Apple iOS Operating system software
    Apple macOS Operating system software
    Bash Operating system software
    Border Gateway Protocol BGP Switch or router software
    C Development environment software
    C# Object or component oriented development software
    C++ Object or component oriented development software
    Extensible markup language XML Enterprise application integration software
    Go Development environment software
    Google Workspace software Office suite software
    Hypertext markup language HTML Web platform development software
    IBM Terraform Configuration management software
    JavaScript Web platform development software
    Kubernetes Application server software
    Microsoft Active Directory Internet directory services software
    Microsoft Excel Spreadsheet software
    Microsoft Windows Operating system software
    Microsoft Windows Server Operating system software
    Oracle Java Object or component oriented development software
    PHP Web platform development software
    Perl Object or component oriented development software
    R Object or component oriented development software
    Ruby Development environment software
    Firewall software Network security and virtual private network VPN equipment software
    Guidance Software EnCase Enterprise Analytical or scientific software
    MITRE ATT&CK software Program testing software
    Operating system software Operating system software
    AccessData FTK Network monitoring software
    Cisco Systems Cisco NetFlow Collection Engine Network monitoring software
    Computer forensic software Filesystem software
    Enterprise application integration EAI software Enterprise application integration software
    Graphical user interface GUI design software Graphical user interface development software
    IBM QRadar SIEM Network monitoring software
    Intrusion detection system IDS Network security or virtual private network VPN management software
    Kali Linux Program testing software
    Management information systems MIS Enterprise resource planning ERP software
    Metasploit Transaction security and virus protection software
    Microsoft Defender Antivirus Transaction security and virus protection software
    Network directory services software Internet directory services software
    OpenVAS Transaction security and virus protection software
    Portswigger BurP Suite Transaction security and virus protection software
    Security assertion markup language SAML Web platform development software
    Single sign-on SSO Authentication server software
    Snort Network monitoring software
    System testing software Program testing software
    Tenable Nessus Transaction security and virus protection software
    Web server software Transaction server software
    Wireshark Network monitoring software
    Geographic information system GIS systems Geographic information system
    Showing 1 to 10 of 0 entries