Forensic computer analysts are responsible for analyzing computer-based information for forensic evidence. These individuals process large amounts of data to find specific items on behalf of their organization. Tasks performed by forensic computer analysts may include handling computer hard drives and storage devices to analyze user patterns, using different computer programs to recover information from destroyed media devices, and preparing detailed reports after running computer analysis software applications, among others. These analysts must be able to work within deadlines and prioritize tasks according to their urgency.
Forensic computer analysts are also responsible for following all safety and privacy procedures when handling sensitive financial or personal information such as documents, videos, or pictures. Additionally, they need to handle and receive evidence carefully and keep accurate logs of duties performed. Forensic computer analysts generally work in an office environment, and their schedule may vary depending on their projects' requirements.
A bachelor's degree in forensic computing, computer security, or a related field is required for this job. Previous related experience is generally required or preferred as well. Forensic computer analysts must be knowledgeable in industry best practices related to computer forensic standards and procedures. They also need to work well in a team setting, as well as on their own with minimal supervision. Additionally, forensic computer analysts must have strong problem-solving and communication skills, as well as be proficient with basic computer programs such as the Microsoft Office suite.
Forensic Computer Analyst Tasks
Contribute to ongoing forensic system and network analysis efforts to support daily vulnerability assessments, briefs, and general computer forensic operations.
Coordinate with other forensic experts to ensure that current intelligence information is communicated and disseminated in a timely manner.
Ensure all forensic investigation activity is executed according to all federal and local law and internal standards.
Conduct forensic research projects on functional information systems, communication programs, and foreign network systems.