Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
Work Activities
- Education Bachelor's degree
- Work Experience No work experience
- Training No on-the-job training
-
Looking for technical training programs?
Check out these programs:
: They do well at jobs that need:
-
Analytical or scientific software
-
Application server software
-
Authentication server software
-
Cloud-based data access and sharing software
-
Configuration management software
-
Data base user interface and query software
-
Development environment software
-
Enterprise application integration software
-
Enterprise resource planning ERP software
-
Enterprise system management software
-
Expert system software
-
Filesystem software
-
Geographic information system
-
Graphical user interface development software
-
Internet directory services software
-
Network monitoring software
-
Network security and virtual private network VPN equipment software
-
Network security or virtual private network VPN management software
-
Object or component oriented development software
-
Office suite software
-
Operating system software
-
Presentation software
-
Program testing software
-
Spreadsheet software
-
Storage networking software
-
Switch or router software
-
Transaction security and virus protection software
-
Transaction server software
-
Web platform development software