Cybercrime Analyst/Investigator

The Cybercrime Analyst/Investigator role includes a variety of entry-level information security positions focused on analyzing and investigating cybercrime events. This role requires an understanding of computer forenics and how malware compromises a system. The Cybercrime Analyst/Investigator is one of four entry-level, core cybersecurity roles mapped directly to the National Initiative for Cybersecurity Education’s CyberSeek model.

Overview

Common Job Titles
  • Digital Forensics Analyst
  • Cyber IT/Forensic/Security Incident Responder
  • Cyber Forensics Analyst
  • Digital Forensics Technician
  • Cyber Security Forensic Analyst
U.S. Job Openings
  • 777
Related Experience
  • Networking
  • Systems Engineering
  • Financial & Risk Analysis
  • Security Intelligence
Skills Needed
  • Computer Forensics
  • Information Security
  • Linux
  • Network Security
  • Python
  • Malware Analysis
  • Information Systems
  • Forensic Toolkit
  • Malware Engineering

Start Learning Today

Get Certified

Improve Your Skills

Skill Training

Network Forensics

Network Forensics On-demand Training

8 Courses | Cyber Range

The Network Forensics skills path helps you fully understand how systems are compromised and what traces are left behind by attackers on the network. You'll learn the concepts, techniques and tools used to analyze logs, protocols, wireless, web traffic and email.

Skill Training

Computer Forensics

Computer Forensics On-demand Training

Coming Soon!

The Computer Forensics skills path teaches you critical techniques about identifying, preserving, extracting, analyzing and reporting forensic evidence through use of the most popular computer forensic tools.

Skill Training

Mobile Forensics

Mobile Forensics On-demand Training

Coming Soon!

The Mobile Forensics skills path teaches you critical techniques about identifying, preserving, extracting, analyzing and reporting forensic evidence found on mobile devices, including Android, iOS, Windows Phone, Blackberry and Feature Phone.

Skill Training

Finding and Analyzing Evidence

Finding and Analyzing Evidence On-demand Training

Coming Soon!

The Finding and Analyzing Evidence skills path teaches you how to discover sensitive data via a variety of avenues, including memory, Windows Registry, social media, Web browsers, the cloud and more.

Skill Training

Extracting Digital Evidence

Extracting Digital Evidence On-demand Training

Coming Soon!

The Extracting Digital Evidence skills path teaches you how to extract sensitive data across a variety of devices, including mobile devices, Windows computers, Linux computers, Apple computers, and Networking and IoT devices.

What Our Students Are Saying

"My instructor and Infosec are a winning combination. ... He is able to take all the knowledge from his vast array of experience and turn 'geekspeak' into laymen's terms so that even the most novice students will understand the concepts. Whatever he's being paid — it's not enough."

Gregory A. Loveless

DTRA

See More Testimonials