{"id":11812,"date":"2023-04-14T21:27:34","date_gmt":"2023-04-14T21:27:34","guid":{"rendered":"https:\/\/www.computerscience.org\/?p=11812"},"modified":"2024-08-28T14:48:06","modified_gmt":"2024-08-28T14:48:06","slug":"what-is-a-computer-forensics-investigator","status":"publish","type":"post","link":"https:\/\/www.computerscience.org\/careers\/computer-forensics-investigator\/","title":{"rendered":"What Is a Computer Forensics Investigator?"},"content":{"rendered":"<p>Computer forensics investigators collect and analyze digital evidence used in legal cases. They typically work in law enforcement and state or federal agencies. Most computer forensics investigators have a bachelor's degree. Some professionals enter this job after attending a bootcamp or gaining experience in a similar field.<\/p>\r\n<p>Use our guide to learn more about what computer forensics investigators do, how to become one, and what kind of job growth and pay you can expect in this career.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"history\" id=\"history\"><\/a>\n\n \r\n<h2>History of Computer Forensics Investigators<\/h2>\r\n<p>The role of computer forensics investigators came from law enforcement's need to collect and examine digital evidence. What we now call computer forensics started at the end of the 20th century, when the Federal Bureau of Investigation (FBI) and other law enforcement agencies created standard procedures for collecting digital evidence.<\/p>\r\n<p>In 1998, an array of agencies &mdash; including the U.S. Postal Inspection Service, the FBI, the Internal Revenue Service, and U.S. Customs &mdash; came together to form a group called the <a href=\"https:\/\/www.utica.edu\/academic\/institutes\/ecii\/publications\/articles\/9C4E695B-0B78-1059-3432402909E27BB4.pdf\" target=\"_blank\" rel=\"noopener\">Technical Working Group Digital Evidence<\/a>. The goal of this organization was to develop standard operating procedures and the corresponding documents to handle digital evidence.<\/p>\r\n<p>The following year, these groups rebranded themselves as scientific working groups (SWGs). SWGs are meetings of no more than 50 people at least once a year to discuss integrating imaging systems and technology into criminal justice. They create recommendations for collecting, storing, and analyzing digital evidence.<\/p>\r\n\r\n<p>Today, computer forensics investigators examine multiple kinds of evidence, including:<\/p>\r\n<ul>\r\n<li>Cellphones<\/li>\r\n<li>Image and video files<\/li>\r\n<li>Audio files<\/li>\r\n<li>Internet browsing history<\/li>\r\n<\/ul>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-primary-light\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n<h2>What Does a Computer Forensics Investigator Do?<\/h2>\r\n<p><a href=\"\/careers\/computer-forensics-investigator\/day-in-the-life\/\">Computer forensics investigators<\/a> collect and examine digital evidence in crimes to determine whether evidence is relevant to ongoing criminal cases. They write reports about this data and testify in court about their findings.<\/p>\r\n<p>These professionals may work long hours to meet tight deadlines and respond to investigations as they develop. Many computer forensics investigators work for law enforcement or governments at the state and federal levels. They work on counterintelligence, criminal, and law investigations. Businesses also hire them to help investigate fraud and intellectual property violations.<\/p>\r\n<p>In addition to analyzing digital evidence, computer forensics investigators monitor the security of digital information. They make recommendations about how to safeguard digitized operations.<\/p>\r\n<p>Computer forensics investigators need several soft and hard skills to work in their roles, which we explore below.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"skills\" id=\"skills\"><\/a>\n\n \r\n<div class=\"grid lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<div>\r\n<h3>Key Soft Skills for Computer Forensics Investigators<\/h3>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#533FBE\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#533FBE\" data-size=\"small\"> <span class=\"text-base\"><strong>Attention to Detail:<\/strong> Because computer forensics investigators comb through massive amounts of data as they search for evidence of wrongdoing, they need a keen eye for detail to find proof for criminal investigations.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#533FBE\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#533FBE\" data-size=\"small\"> <span class=\"text-base\"><strong>Time Management:<\/strong> Computer forensics investigators can face tight deadlines, working long or unusual hours to gather evidence for criminal trials. As cases unfold and change, they may need to shift their priorities and manage their time accordingly.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#533FBE\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#533FBE\" data-size=\"small\"> <span class=\"text-base\"><strong>Communication:<\/strong> Computer forensics investigators must testify in court and write reports on their findings about evidence for court cases. These duties require strong written and verbal communication skills.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#533FBE\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#533FBE\" data-size=\"small\"> <span class=\"text-base\"><strong>Analytical Skills:<\/strong> Computer forensics investigators spend significant time examining data and digital evidence. They must use their analytical skills and knowledge of laws and regulations to determine which evidence is suitable for a given case.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n<\/div>\r\n\r\n<div>\r\n<h3>Key Hard Skills for Computer Forensics Investigators<\/h3>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Forensics:<\/strong> Computer forensics investigators are experts in forensic techniques that help them examine and collect evidence relevant to ongoing investigations.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Software Tools:<\/strong> Computer forensics investigators must understand how to navigate software interfaces like iOS, Android, Windows, and Amazon Web Services that can be used to commit crimes or store digital evidence.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Cybersecurity:<\/strong> Computer forensics investigators must be <a href=\"\/bootcamps\/rankings\/cybersecurity\/\">skilled in cybersecurity<\/a>, as their work may require them to decrypt data to conduct their investigations. They may also recommend cybersecurity strategies to prevent future cybercrimes.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Regulatory Knowledge: <\/strong>Computer forensics investigators need to know the policies and procedures that regulate their investigations. They must ensure their investigations comply with these policies.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n<\/div>\r\n\n<\/div>\n\r\n\r\n<h3>A Day in the Life of a Computer Forensics Investigator<\/h3>\r\n<p>Computer forensics investigators spend much of their workday collecting and examining digital evidence related to criminal investigations. They analyze this data, write reports about their findings, and testify in court cases. They may also make recommendations about how to increase the security of digital information to prevent future breaches.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/careers\/computer-forensics-investigator\/day-in-the-life\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about a typical day for a computer forensics investigator<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-primary-light\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"salary\" id=\"salary\"><\/a>\n\n \r\n<h2>Computer Forensics Investigator Career Outlook<\/h2>\r\n<p>The <a href=\"https:\/\/www.bls.gov\/ooh\/about\/data-for-occupations-not-covered-in-detail.htm#Computer%20and%20mathematical%20occupations\" target=\"_blank\" rel=\"noopener\">U.S. Bureau of Labor Statistics<\/a> (BLS) projects 10% job growth from 2021 to 2031 for \"all other computer occupations,\" a broad career category which includes computer forensics investigators. This faster-than-average growth projection reflects the continued demand for cybersecurity workers in the digital age.<\/p>\r\n<p>Computer forensics investigators make an average annual salary of $75,530, according to <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Forensic_Computer_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale data from March 2023<\/a>. Wages for computer forensics investigators vary with experience: For example, midcareer computer forensic investigators make an average salary of $89,530, according to March 2023 Payscale data.<\/p>\r\n<p>Factors like education also impact earning potential. For instance, according to Payscale, professionals with <a href=\"\/degrees\/masters\/computer-forensics\/\">master's degrees<\/a> in cybersecurity earn <a href=\"https:\/\/www.payscale.com\/research\/US\/Degree=Master_of_Science_(MS)%2C_Cybersecurity\/Salary\" target=\"_blank\" rel=\"noopener\">$93,000 on average<\/a>, higher than the <a href=\"https:\/\/www.payscale.com\/research\/US\/Degree=Bachelor_of_Science_(BS_%2F_BSc)%2C_Cybersecurity\/Salary\" target=\"_blank\" rel=\"noopener\">$75,000 average<\/a> that professionals with cybersecurity bachelor's degrees make.<\/p>\r\n<p>Salaries vary by location: <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151299.htm\" target=\"_blank\" rel=\"noopener\">BLS data<\/a> about all <a href=\"\/careers\/\">other computer occupations<\/a> show that these professionals earn the highest average wages in Washington, D.C.; Maryland; and California.<\/p>\r\n\r\n<div class=\"text-center border-thin bg-secondary-light\" style=\"max-width: fit-content; margin-left: auto; margin-right: auto; padding: 0 100px 0 100px;\">\r\n    <p><span class=\"heading-1\">$75,530<\/span><br>\r\n        <p>Average Annual Salary<\/p>\r\n        <p><small><strong>Source:<\/strong> <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Forensic_Computer_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale<\/a><\/small><\/p>\r\n<\/div>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/careers\/computer-forensics-investigator\/career-outlook-and-salary\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">See how education affects salary for computer forensics investigators<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"how-to-become\" id=\"how-to-become\"><\/a>\n\n \r\n<h2>How to Become a Computer Forensics Investigator<\/h2>\r\n<p>Computer forensics investigators typically hold <a href=\"\/degrees\/best-online-bachelors\/\">bachelor's degrees in computer science<\/a>, <a href=\"\/cybersecurity\/degrees\/best-online-bachelors\/\">cybersecurity<\/a>, or <a href=\"\/degrees\/bachelors\/computer-forensics\/\">computer forensics<\/a>. These degrees usually take four years of full-time study. However, you may be able to start your career more quickly through a boot camp. Other computer forensics professionals begin their careers in adjacent fields like information technology or law enforcement.<\/p>\r\n<p>Professional organizations like GIAC and ISACA offer credentials in areas like digital forensics and incident response. Though these certifications are not equivalent to required degrees, they can help aspiring computer forensics investigators stand out in the job market and offer verification of their field-specific skills.<\/p>\r\n<p>Check out additional resources for computer forensics investigators below:<\/p>\r\n\r\n\r\n  \n\n  <section class=\"cards text-center\" data-cy=\"cards\">\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1681508008\/ComputerScience.org\/how-to-become-a-forensic-investigator\/how-to-become-a-forensic-investigator.jpg?_i=AA\"\n        alt=\"How to Become a Computer Forensics Investigator\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">How to Become a Computer Forensics Investigator<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\">Find out how to become a computer forensics investigator, including the education, experience, and certification requirements.<\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/careers\/computer-forensics-investigator\/how-to-become\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1681756764\/ComputerScience.org\/computer-forensic-investigator-day-in-the-life\/computer-forensic-investigator-day-in-the-life.jpg?_i=AA\"\n        alt=\"Day in the Life of a Computer Forensics Investigator\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Day in the Life of a Computer Forensics Investigator<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\">Discover what a computer forensics investigator does daily.<\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/careers\/computer-forensics-investigator\/day-in-the-life\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1662131753\/ComputerScience.org\/GettyImages-1184998952_73526b3e\/GettyImages-1184998952_73526b3e.jpg?_i=AA\"\n        alt=\"Computer Forensics Degree Programs\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Computer Forensics Degree Programs<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\">Learn whether a computer forensics degree aligns with your career goals and determine which programs work best for you.<\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/computer-forensics\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1662131313\/ComputerScience.org\/GettyImages-867421140_688f799a\/GettyImages-867421140_688f799a.jpg?_i=AA\"\n        alt=\"Certifications for Computer Science Professionals\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Certifications for Computer Science Professionals<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\">Find out what certifications could be right for you and why you should pursue them.<\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/certifications\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\r\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"careers\" id=\"careers\"><\/a>\n\n \r\n<h2>Similar Specializations and Career Paths<\/h2>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><a href=\"\/careers\/information-technology-architect\/\"><strong>Network Architects<\/strong><\/a>: Network architects are experienced IT professionals who specialize in the preventative aspects of computer forensics. They oversee the creation of new security systems, conduct risk assessments, and make sure these systems meet regulations.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><a href=\"\/careers\/information-security-analyst\/\"><strong>Information Security Analyst<\/strong><\/a>: Information security analysts work to prevent cybersecurity attacks. They establish security protocols, protect digital assets, test for system weaknesses, and prepare response plans for system breaches. They also test computer systems for efficiency and effectiveness.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><a href=\"\/careers\/information-technology-architect\/\"><strong>IT Security Architect<\/strong><\/a>: Security architects research, design, and implement security systems and protocols for their company. They test these systems, respond to problems as they arise, and develop policies and procedures that govern the systems' use.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><a href=\"\/careers\/software-developer\/\"><strong>Software Developers<\/strong><\/a>: Software developers design security software to meet the needs of their clients. They write code in various programming languages, build software, and test their designs to ensure proper function.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"badge-check\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"badge-check\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><a href=\"\/careers\/computer-information-researcher\/\"><strong>Computer Information Researcher<\/strong><\/a>: Computer information researchers conduct studies, analyze data, and create new technologies to further computer science and information technology. They can specialize in areas such as <a href=\"\/degrees\/artificial-intelligence\/\">artificial intelligence<\/a>, robotics, or programming.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n<table class=\"sonic-table\">\r\n<tbody>\r\n    <thead>\r\n<tr>\r\n<th>\r\n<strong>Career<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Required Education<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Required Experience<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Average Annual Salary<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Projected Growth Rate (2021-2031)<\/strong>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><strong>Network Architects<\/strong><\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Bachelor's Degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>5 years or more<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Salary\">\r\n<p><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-network-architects.htm\" target=\"_blank\" rel=\"noopener\">$120,520<\/a><\/p>\r\n<\/td>\r\n<td data-title=\"Projected Growth Rate (2021-2031)\">\r\n<p>4%<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><strong>Information Security Analysts<\/strong><\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Bachelor's Degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>Fewer than 5 years<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Salary\">\r\n<p><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">$102,600<\/a><\/p>\r\n<\/td>\r\n<td data-title=\"Projected Growth Rate (2021-2031)\">\r\n<p>35%<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><strong>Security Architects<\/strong><\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Bachelor's Degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>5 years or more<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Salary\">\r\n<p><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Security_Architect%2C_IT\/Salary\" target=\"_blank\" rel=\"noopener\">$134,440<\/a><\/p>\r\n<\/td>\r\n<td data-title=\"Projected Growth Rate (2021-2031)\">\r\n<p>N\/A<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><strong>Software Developers<\/strong><\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Bachelor's Degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>None<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Salary\">\r\n<p><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/software-developers.htm\" target=\"_blank\" rel=\"noopener\">$109,020<\/a><\/p>\r\n<\/td>\r\n<td data-title=\"Projected Growth Rate (2021-2031)\">\r\n<p>25%<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Career\">\r\n<p><strong>Computer Information Researchers<\/strong><\/p>\r\n<\/td>\r\n<td data-title=\"Required Education\">\r\n<p>Master's Degree<\/p>\r\n<\/td>\r\n<td data-title=\"Required Experience\">\r\n<p>None<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Salary\">\r\n<p><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener\">$131,490<\/a><\/p>\r\n<\/td>\r\n<td data-title=\"Projected Growth Rate (2021-2031)\">\r\n<p>21%<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align: right;\"><strong>Sources:<\/strong> <a href=\"https:\/\/www.bls.gov\/\" target=\"_blank\" rel=\"noopener\">Bureau of Labor Statistics<\/a>, <a href=\"https:\/\/www.payscale.com\/\" target=\"_blank\" rel=\"noopener\">Payscale<\/a><\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/careers\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore more careers in computer science<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-primary-light\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n \r\n<h2>Resources for Computer Forensics Investigators<\/h2>\r\n<p>These professional organizations offer resources for computer forensics investigators such as networking, professional development, industry news, credentials, and awards.<\/p>\r\n\r\n\r\n<h2>Professional Organizations for Computer Forensics Investigators<\/h2>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.issa.org\/\" target=\"_blank\" rel=\"noopener\"><strong>Information Systems Security Association<\/strong><\/a> (ISSA): ISSA is a community of cybersecurity professionals committed to promoting global digital security. Members can access career development opportunities, job boards, and updates on best practices and developments in the industry.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.isaca.org\/\" target=\"_blank\" rel=\"noopener\"><strong>ISACA<\/strong><\/a>: ISACA is a community of IT professionals designed to help IT professionals at all levels. They offer professional development opportunities, industry news, credentialing, and networking events.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.aafs.org\/\" target=\"_blank\" rel=\"noopener\"><strong>American Academy of Forensics Sciences<\/strong><\/a> (AAFS): AAFS is a community of forensics professionals looking to advance science and scientific applications in the legal system. Member benefits include continuing education, networking, and leadership opportunities.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.isfce.com\/\" target=\"_blank\" rel=\"noopener\"><strong>International Society of Forensic Computer Examiners<\/strong><\/a> (ISFCE): The ISFCE is an internationally recognized organization known for its certifications, training, and proficiency testing.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n \r\n<h2>Questions About Computer Forensics Investigators<\/h2>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">What does a computer forensics investigator do?<\/mark><\/h3>\r\n            <p>Computer forensics investigators collect and analyze digital evidence related to criminal investigations. They also write reports, record their findings, and testify in court. They may also make recommendations about how to secure information.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">What skills must a computer forensics investigator possess?<\/mark><\/h3>\r\n            <p>Computer forensics investigators need to be skilled in <a href=\"\/bootcamps\/guides\/programming-languages-software-engineering\/\">software tools<\/a>, forensics, computer forensics, cybersecurity, and security policies and procedures. They also need soft skills such as communication, analytical thinking, time management, and attention to detail.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">Is computer forensics a good career?<\/mark><\/h3>\r\n            <p>Computer forensics can be a rewarding career for people who want to blend their skills in computer science, cybersecurity, and forensics to investigate crimes.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">What's the difference between cybersecurity and computer forensics?<\/mark><\/h3>\r\n            <p>The difference between cybersecurity and computer forensics is that cybersecurity aims to prevent cybercrime, while computer forensics investigates these crimes after the fact.<\/p>        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>","protected":false},"excerpt":{"rendered":"Interested in a career as a computer forensics investigator? Learn more about the salary, education, and employment requirements for computer forensics investigator careers.","protected":false},"author":56,"featured_media":11814,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[54,1],"bootcamps":[],"states":[],"resources":[],"careers":[],"degrees":[],"class_list":["post-11812","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-careers","category-uncategorized"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/11812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/comments?post=11812"}],"version-history":[{"count":4,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/11812\/revisions"}],"predecessor-version":[{"id":12488,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/11812\/revisions\/12488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/media\/11814"}],"wp:attachment":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/media?parent=11812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/categories?post=11812"},{"taxonomy":"bootcamps","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/bootcamps?post=11812"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/states?post=11812"},{"taxonomy":"resources","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/resources?post=11812"},{"taxonomy":"careers","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/careers?post=11812"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/degrees?post=11812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}