Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become A Forensic Computer Examiner

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As A Forensic Computer Examiner

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $88,000

    Average Salary

What Does A Forensic Computer Examiner Do At General Dynamics Mission Systems

* Provides forensic examination support for the Department of Defense Cyber Crime Center (DC3)and supporting organizations.
* Conducts forensic processes on a variety of digital media including hard drives, thumb drives, media cards, cell phones and other devices.
* Creates detailed notes on processes undertaken and develops forensic reports in support of counterintelligence or criminal investigations and other types of inquiries.
* Assists the customer in developing new and innovative forensic processes and procedures.
* Conducts peer reviews of other examiners' reporting.
* Provides expert witness testimony in both military and civilian courts in support of forensic examinations conducted by the examiner

What Does A Forensic Computer Examiner Do At Chenega Corporation

* Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position)
* Provide support for CI and CT investigations
* Research, design, deploy, and lead training events
* Evaluate emerging forensic technologies
* Provide operational security assessments and support cyber forensic and cyber security tasks
* Perform all phases of the forensic examination of digital media, including on-site and off-site evidence acquisition/seizures, forensic analysis, and reporting, ensuring chain of custody is maintained and that applicable rules of evidence are adhered to
* Provide support for incident response activities, intrusion events, and malware analysis
* Non
* Essential Duties:
* Other duties as assigned
* Supervisory Responsibilities:
* NONE

What Does A Forensic Computer Examiner Do At Nana Regional Corporation

* The employee shall perform computer forensic examinations in support of a Government customer
* General duties include the duplication of computer hard drives, the examination of the hard drives for files and data fragments of interest, examination of other digital related evidence, and the reporting of the findings in writing.
* R** **outine tasks to be performed are:
* Inventory the seized digital evidence for identifiable information and duplicate/image for preservation purposes.
* Delete or neutralize computer viruses.
* Recover active, system and hidden filenames with date/time stamp information.
* Detect and recover erased files, file slack, file fragments (unallocated clusters).
* View various file formats using browser technology and selectively print files of interest.
* Crack (or attempt to crack) password protected files.
* Execute a file and view the data contents.
* Perform keyword or string searches.
* Report the findings in writing.
* Provide on-site computer backup support (hard drive duplication) anywhere in the Continental United States (CONUS).
* Demonstrate basic examiner qualification by successfully completing a qualification test prior to starting any evidence examination work.
* Demonstrate proficiency on an annual basis by successfully completing one quality assurance test consisting of examining a computer in which the contents are already known.
* Maintain awareness and follow laboratory evidence handling, evidence examination, laboratory safety, and laboratory security policy and procedures.
* Provide testimony on evidence examination or evidence handling as a fact witness or expert witness.
* Inventory the seized digital evidence for identifiable information and duplicate/image for preservation purposes
* Delete or neutralize computer viruses
* Recover active, system and hidden filenames with date/time stamp information
* Detect and recover erased files, file slack, file fragments (unallocated clusters)
* View various file formats using browser technology and selectively print files of interest
* Crack (or attempt to crack) password protected files
* Execute a file and view the data contents
* Perform keyword or string searches
* Report the findings in writing
* Provide on-site computer backup support (hard drive duplication) anywhere in the Continental United States (CONUS)
* Demonstrate basic examiner qualification by successfully completing a qualification test prior to starting any evidence examination work
* Demonstrate proficiency on an annual basis by successfully completing one quality assurance test consisting of examining a computer in which the contents are already known
* Maintain awareness and follow laboratory evidence handling, evidence examination, laboratory safety, and laboratory security policy and procedures
* Provide testimony on evidence examination or evidence handling as a fact witness or expert witness

What Does A Forensic Computer Examiner Do At Enterprise Information Services, Inc.

* Investigate suspected instances of computer, mobile device, and network penetrations.
* Ingest media into an archive, copy media images, and employ advanced media forensics tools during the course of a forensic examination (ENCASE and Windows Forensic Toolkit are two of the many tools used for media forensics).
* Investigate and eradicate computer viruses and malicious code and prepare, write, and present reports and briefings.
* Provide weekly status updates when conducting forensics.
* Provide a written report at the conclusion of each forensics examination.
* Personnel will conduct CI cyber inquiries to determine possible foreign intelligence entity involvement with an NGA computer system.
* In the process of conducting an inquiry, Reports of Inquiry must be produced and updated weekly.
* Perform in-depth forensics examinations of computers, mobile devices, networks and other electronic and digital devices.
* Possess experience conducting computer forensics analysis within the Department of Defense and/or Intelligence Community.
* Attend periodic CI and law enforcement community cyber investigations awareness briefings.
* Brief CI cyber products and CI cyber service results to senior NGA leadership.
* Collaborate with internal and external Intelligence Community partners to share and gather technical threat information to enhance forensics examinations.
* Integrate information from forensics examinations and compile results into reports as required.
* Prepare and present forensic findings in the form of briefings and/or reports, to government leads and managers as required.
* Participate in Intelligence Community and Department of Defense technical exchange and collaboration meetings as required.
* Produce detailed CI cyber forensics reports as required.
* Provide support to all CI mission functions as required.
* Participate in IC Community and NGA technical meetings and working groups to address issues related to computer security and vulnerabilities.
* Investigate suspected instances of computer, mobile device, and network penetrations.
* Ingest media into an archive, copy media images, and employ advanced media forensics tools during the course of a forensic examination.
* Effectively utilize all applications and common analytic software tools (i.e., Word, Excel, PowerPoint, Analyst Notebook).
* Must have an active TS/SCI Clearance
* Shall possess a minimum of 11 years of forensic experience in CI or CI cyber investigations.
* Possess knowledge and understanding of foreign adversaries’ security and intelligence services, terrorist organizations, and cyber threats posed to NGA, DoD and IC partners.
* Shall be a credentialed graduate of an accredited federal or DoD CI training academy (ex.
* FBI Academy, etc.).
* Shall possess a Bachelor’s Degree in Computer Science, Engineering, or a related technical discipline,.
* Shall possess and maintain vendor-funded Encase certification as a computer forensics examiner

What Does A Forensic Computer Examiner Do At Minnesota Visiting Nurse Agency

* 1.The Examiner will respond to the Call Center within fifteen (15) minutes of the page and supply an estimated time of arrival to the hospital.
* The goal is to arrive within 1 hour from the page.
* Provide acute (within 168 hours of a sexual assault) examination of adult and adolescent patients at all contracted facilities
* Provide acute (within 168 hours of a sexual assault) examination of pediatric patients at Hennepin County Medical Center and University of Minnesota Masonic Children's Hospital
* a
* Respond if assault has occurred within 168 hours
* i
* If pre-menarchal and assault > 72 hours, evidence collection may or may not be warranted depending on totality of circumstances and the SANE will be expected to use good judgment and discretion in these cases to decide whether or not evidence collection should occur.
* The Examiner always has the option to consult with the Manager of the Day and/or the department Medical Director to aid in these decisions.
* Depending on the totality of the circumstances, the Examiner may decide that an acute exam is still warranted even past the 168 hour mark.
* This decision will be determined with the assistance of the Manager of the Day and/or the Medical Director.
* Functions of a medical forensic examination include the following:
* a
* Medical-legal interview including the initial screening interview, identification, documentation and medical team consult for injury care.
* Collection of forensic evidence (based on interview) including photographs.
* b
* Sexually transmitted infection prophylaxis, if indicated
* c
* Emergency contraception, if indicated
* d
* HIV prophylaxis, if indicated
* e
* Crisis intervention, and follow-up information and referral
* f
* Collaboration and case management with Child Protection, Adult Protection, Social Work, etc. (if needed).
* Attend the department’s monthly staff meeting.
* Follow the Holiday and Minimum Hour Requirement for casual examiners.
* Meet the minimum of 40 hours of on-call availability.
* Follow the self-scheduling monthly process.
* Be responsible for any equipment provided by the department (camera, memory cards, pager, badge)
* Maintain chain of custody on all evidence collected and follow procedure for securing evidence
* Adhere to all HCMC policies set forth by the organization
* Prep for and appear to testify in all cases in compliance with subpoenas
* Maintain certifications associated with the work of a forensic examiner
* Conduct forensic exams and evidence collection for non-sexual assault cases under department protocols

Show More

Show Less

How To Become A Forensic Computer Examiner

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Forensic Computer Examiner jobs

Add To My Jobs

Forensic Computer Examiner Demographics

Gender

  • Male

    75.9%
  • Female

    21.8%
  • Unknown

    2.4%

Ethnicity

  • White

    82.5%
  • Hispanic or Latino

    7.6%
  • Asian

    6.9%
  • Unknown

    2.4%
  • Black or African American

    0.6%
Show More

Languages Spoken

  • French

    100.0%

Forensic Computer Examiner

Unfortunately we don’t have enough data for this section.

Forensic Computer Examiner Education

Forensic Computer Examiner

Unfortunately we don’t have enough data for this section.

Job type you want
Full Time
Part Time
Internship
Temporary

Real Forensic Computer Examiner Salaries

Job Title Company Location Start Date Salary
Digital Forensic Examiner Stroz Friedberg, LLC San Francisco, CA Dec 17, 2012 $120,000
Digital Forensic Examiner Stroz Friedberg, LLC Los Angeles, CA Jul 26, 2010 $100,000 -
$150,000
Digital Forensic Examiner Stroz Friedberg, LLC Los Angeles, CA Jul 30, 2010 $100,000 -
$150,000
Digital Forensics Examiner II Stroz Friedberg, LLC New York, NY Oct 01, 2013 $80,000 -
$100,000

No Results

To get more results, try adjusting your search by changing your filters.

Show More

Top Skills for A Forensic Computer Examiner

AnalyzeDigitalEvidenceComputerForensicExaminationsDigitalForensicExaminationsLawEnforcementAgenciesFTKImagerForensicToolsInternetSafetyCellPhonesForensicAnalysisCriminalInvestigationsLinuxFraudCyberDataRecoveryWindowsSearchWarrantsChildPornographyComputerForensicSoftwareIncidentResponseCriminalCases

Show More

Top Forensic Computer Examiner Skills

  1. Analyze Digital Evidence
  2. Computer Forensic Examinations
  3. Digital Forensic Examinations
You can check out examples of real life uses of top skills on resumes here:
  • Conducted digital forensic examinations on captured enemy material in Southern Afghanistan and provided EnCase and Cellebrite training to US intelligence personnel.
  • Force, consisting of 19 Federal, State, and Local law enforcement agencies.
  • Utilized the FBI Linux Boot CD and FTK Imager for creating copies of digital evidence.
  • Utilize leading-edge forensic tools to analyze computer/cell phone data; restore damages/erased hard drives to aid evidence collection and investigation.
  • Trained and mentored junior computer forensics examiner, resulting in improved performance in data recovery and forensic analysis.

Top Forensic Computer Examiner Employers

Show More