How do they match: Digital Forensics Analysts

  • Digital Forensics Analysts

  • Data Security Engineer
  • Cyber Analyst
  • Cyber Digital Media Analyst
  • Cybersecurity Analyst
  • Cybersecurity Incident Response Analyst
  • Digital Analyst
  • Digital Computer Analyst
  • Digital Cyber Analyst
  • Digital Forensic Analyst
  • Digital Forensics Analyst
  • Digital Media Analyst
  • IT Analyst
  • IT Security Analyst
  • Incident Response Analyst
  • Information Security Analyst
  • Information Technology Analyst
  • Information Technology Security Analyst
  • Law Enforcement Counterintelligence Forensics Analyst
  • Legal Digital Analyst
  • Malware Analyst
  • Operations Analyst
  • Security Analyst

  • Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.

  • Analyze log files or other digital information to identify the perpetrators of network intrusions.
  • Create system images or capture network settings from information technology environments to preserve as evidence.
  • Develop policies or requirements for data collection, processing, or reporting.
  • Duplicate digital evidence to use for data recovery and analysis procedures.
  • Perform web service network traffic analysis or waveform analysis to detect anomalies, such as unusual events or trends.
  • Recover data or decrypt seized data.
  • Write technical summaries to report findings.
  • Write and execute scripts to automate tasks, such as parsing large data files.

  • Analyze security of systems, network, or data.
  • Analyze traffic data.
  • Compile technical information or documentation.
  • Develop technical methods or processes.
  • Examine records or other types of data to investigate criminal activities.