It's a bright outlook for
This career will grow rapidly in the next few years.
Learn more about what they do.
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
Computer Systems Analysts
Document Management Specialists
Information Security Analysts
Information Security Engineers
Professional, Science, & Technical
Answer a few questions to
determine your target salary.
Use this target salary to help
choose the right occupation
The Workforce Supply Tool provides statistics for the occupations in highest demand throughout Ohio.
You can view statewide statistics as well as more region specific information.