FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

FIND
PERSONALIZED JOBS

Become A Forensic Computer Examiner

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As A Forensic Computer Examiner

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $88,000

    Average Salary

What Does A Forensic Computer Examiner Do

Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Duties

Information security analysts typically do the following:

  • Monitor their organization’s networks for security breaches and investigate a violation when one occurs
  • Install and use software, such as firewalls and data encryption programs, to protect sensitive information
  • Prepare reports that document security breaches and the extent of the damage caused by the breaches
  • Conduct penetration testing, which is when analysts simulate attacks to look for vulnerabilities in their systems before they can be exploited
  • Research the latest information technology (IT) security trends
  • Help plan and carry out an organization’s way of handling security
  • Develop security standards and best practices for their organization
  • Recommend security enhancements to management or senior IT staff
  • Help computer users when they need to install or learn about new security products and procedures

Information security analysts must continually adapt to stay a step ahead of cyberattackers. They must stay up to date on the latest methods attackers are using to infiltrate computer systems and on IT security. Analysts need to research new security technology to decide what will most effectively protect their organization. This may involve attending cybersecurity conferences to hear firsthand accounts of other professionals who have experienced new types of attacks.

IT security analysts are heavily involved with creating their organization’s disaster recovery plan, a procedure that IT employees follow in case of emergency. These plans allow for the continued operation of an organization’s IT department. It includes preventive measures such as regularly copying and transferring data to an offsite location. It also involves plans to restore proper IT functioning after a disaster. Analysts continually test the steps in their recovery plans.

Because information security is important, these workers usually report directly to upper management. Many information security analysts work with an organization’s computer and information systems manager or chief technology officer (CTO) to design security or disaster recovery systems.

Show More

Show Less

How To Become A Forensic Computer Examiner

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Forensic Computer Examiner jobs

NO RESULTS

Aw snap, no jobs found.

Add To My Jobs

Forensic Computer Examiner Demographics

Gender

Male

75.9%

Female

21.8%

Unknown

2.4%
Ethnicity

White

82.5%

Hispanic or Latino

7.6%

Asian

6.9%

Unknown

2.4%

Black or African American

0.6%
Show More
Languages Spoken

French

100.0%

Forensic Computer Examiner Education

Schools

Champlain College

11.3%

University of Phoenix

9.4%

University of Central Florida

7.5%

George Mason University

7.5%

Bloomsburg University of Pennsylvania

7.5%

University of Maryland - University College

5.7%

Strayer University

5.7%

Johns Hopkins University

5.7%

American InterContinental University

5.7%

Boise State University

3.8%

Colorado Technical University

3.8%

Utica College

3.8%

Yale University

3.8%

University of Rhode Island

3.8%

Stevenson University

3.8%

University of Mississippi

3.8%

Marshall University

1.9%

Norwich University

1.9%

University of Memphis

1.9%

College of Saint Scholastica

1.9%
Show More
Majors

Criminal Justice

30.1%

Business

11.4%

Information Technology

7.3%

Clinical Psychology

6.5%

Computer Systems Security

5.7%

Computer Science

5.7%

Electrical Engineering

4.1%

Information Systems

3.3%

Nursing

3.3%

Computer Information Systems

2.4%

Biology

2.4%

Military Applied Sciences

2.4%

Law Enforcement

2.4%

Chemistry

2.4%

Computer Engineering

2.4%

Management

1.6%

Project Management

1.6%

Political Science

1.6%

Management Information Systems

1.6%

Fire Science And Protection

1.6%
Show More
Degrees

Bachelors

38.9%

Masters

24.2%

Other

17.8%

Doctorate

8.9%

Associate

7.0%

Certificate

3.2%
Show More
Job type you want
Full Time
Part Time
Internship
Temporary

Real Forensic Computer Examiner Salaries

Job Title Company Location Start Date Salary
Digital Forensic Examiner Stroz Friedberg, LLC San Francisco, CA Dec 17, 2012 $120,000
Digital Forensic Examiner Stroz Friedberg, LLC Los Angeles, CA Jul 26, 2010 $100,000 -
$150,000
Digital Forensic Examiner Stroz Friedberg, LLC Los Angeles, CA Jul 30, 2010 $100,000 -
$150,000
Digital Forensics Examiner II Stroz Friedberg, LLC New York, NY Oct 01, 2013 $80,000 -
$100,000

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for A Forensic Computer Examiner

AnalyzeDigitalEvidenceComputerForensicExaminationsDigitalForensicExaminationsLawEnforcementAgenciesFTKImagerForensicToolsInternetSafetyCellPhonesForensicAnalysisCriminalInvestigationsLinuxFraudCyberDataRecoveryWindowsSearchWarrantsChildPornographyComputerForensicSoftwareIncidentResponseCriminalCases

Show More

Top Forensic Computer Examiner Skills

  1. Analyze Digital Evidence
  2. Computer Forensic Examinations
  3. Digital Forensic Examinations
You can check out examples of real life uses of top skills on resumes here:
  • Conducted digital forensic examinations on captured enemy material in Southern Afghanistan and provided EnCase and Cellebrite training to US intelligence personnel.
  • Force, consisting of 19 Federal, State, and Local law enforcement agencies.
  • Utilized the FBI Linux Boot CD and FTK Imager for creating copies of digital evidence.
  • Utilize leading-edge forensic tools to analyze computer/cell phone data; restore damages/erased hard drives to aid evidence collection and investigation.
  • Trained and mentored junior computer forensics examiner, resulting in improved performance in data recovery and forensic analysis.

Top Forensic Computer Examiner Employers

Show More