Forensic Analyst

Improved Essays
The Face Behind The Screen In 2012, Federal Bureau of Investigations Director Robert Mueller once said, “There are only two types of companies: those that have been hacked, and those that will be” (Crowley 12). Cyber security is a constant problem in this world; people use the internet daily, which hackers can easily circumvent. Law enforcement agencies have now started Cyber Divisions for local, state, and federal investigative cases. According to the Detective at the Rapides Parish Sheriff Cyber Division, “a Cyber Forensics Analyst is someone who recovers digital information and data from computers and storage devices” (Gunter). This paper will explore the education and skills, job outlook, and job descriptions of a Cyber Forensics …show more content…
Mainly the analyst does the following: “Protect against criminals, strengthen the security and resilience of cyber space, securing federal networks, report data from a variety of sources to produce reports, and threat/ risk assessments” (Cyber Security Education 5). If a Cyber Analyst works for law enforcement, the focus mainly surrounds the investigation of criminal and illegal activity. Detective Gunter explains that when a device is received, it must go through a series of investigative tools to decipher the information it contains. For example, when working on a well known murder case, Detective Gunter was able to obtain text messages that linked the individual to the murder (Gunter). The law enforcement analysts also work on computer hard drives to obtain information as it relates to child abuse and stalking. “If the suspect has been to certain websites or there is evidence of illegal activity, a case will begin to be built” …show more content…
The Cyber Analyst “provides advice and guidance in implementing cyber security policies and procedures in the development; they also provide advanced technical support to complex cyber investigations and operations” ( Cyber Analyst 4). It is crucial to provide protection not only for the customers, but also for the corporation’s integrity. Therefore, in the private sector, most analysts will look for viruses that may come into the system, and work to remove the threats (Cyber Analyst 4). In both the private and public sector, analysts “review proposed new systems, networks, and software designs for the potential security risk” (Cyber Security Education 3).
Cyber careers are becoming a leading job opportunity for the twenty first century. When exploring a career as a Cyber Analyst, one must look at the aspects of education and skills, job outlook, and job descriptions to make an informed decision. Individuals have a choice of entering the public or private sector, depending on the individual’s preferences. There are a wide variety of job titles one can choose. “If a person wants a career that involves a passion for computers and a love of solving crimes, this would be the perfect fit”

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Developing data analytics to monitor and screen cybersecurity threats and react to threat attacker episodes and review log activities (Bergquist, 2016). Technical recommendations to boost security without significantly increasing personnel management can be achieved by incorporating security frameworks reviews, examining any area(s) of weakness or vulnerabilities and implementing security controls. Business partners of ABC Healthcare such as banks, vendors, and collection agencies will continue to thrive with the integration of proper security measures without introducing significant overhead and complexity. Integrating data sharing polices can protect the information and ultimately reduce the level of access to individuals information. To tackle information security infringements, ABC healthcare business partners must concentration on the collaboration of security control with ABC Healthcare to enforce security regulations such as data encryption, data sharing and disposal policies, and educate personnel by…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    One of the problems that remains an issue for fusion centers is although they are good at dispersing information between all levels of law enforcement, there remains a disconnect between the private sector and the fusion centers. In a recent survey conducted with seventy of the seventy-seven fusion centers around the country, 2.1 percent of them admitted that they received daily information from the private sector (Erickson, 2012). Without the private sectors input of information there remains a disconnect of information and this should be addressed as soon as possible. Another problem that persists is the difficulty that fusion centers have when it comes to their ability to “analyze cyber security relevant information (Erickson, 2012).” This could easily be fixed by employing more knowledgeable personnel.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    ISSUES IN HOMELAND SECURITY WRITING ASSIGNMENT THE HISTORY The United States Secret Service is one of the oldest federal law enforcement agencies in the country and ranks among the most elite in the world. With its origin dating back to the end of the American Civil War (July 5,1865), the Secret Service was originally founded to combat the then-widespread counterfeiting of U.S. currency. In 1901, the agency was asked to begin its protective mission after the assassination of President William McKinley – the third sitting U.S. President to be assassinated. Today, the Secret Service proudly continues to protect both national leaders and visiting foreign VIPs while helping to secure the nation’s financial infrastructure through financial…

    • 866 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    There is the Crime scene investigator and the laboratory analysis technician forensic scientist . The job of the crime scene investigator is to travel to the crime scenes, take pictures and collect evidence for the laboratory, make sketches, make observations and take notes (Occupational Outlook Handbook). As well as going to the scene of the crime the crime scene investigator will also work in offices and sometimes also help in the lab. In order to be a crime scene investigator you have to be able to work unusual hours and be prepared to work in all kinds of weather conditions, maintain your professionalism, object and testify in court, notice small and delicate changes and spend much of your day working in the crime scene (Occupational Outlook Handbook). The laboratory analysis technician forensic scientists usually perform analysis like DNA, toxicology, pathology and autopsies.…

    • 791 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Criminal Profiler Career

    • 734 Words
    • 3 Pages

    Career Field Report: Criminal Profiler High school was a hard time for me because I didn’t like school at all. My junior and senior year I was home schooled through K12 Online Public School. I wasn’t planning on going to college at all until the middle of my senior year I really started to think about going to college. In May 2012 I applied to go to Sheridan College and was thinking about the Criminal Justice because I was leaning towards being an attorney. I declared my major as Criminal Justice.…

    • 734 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Crime Scene Investigator

    • 409 Words
    • 2 Pages

    Crime scene investigators (CSI) is an investigator, that is in charge of the crime scene cases. The crime scene investigator responsibility is to properly document the scene and identify, process and collect physical evidence. Their expertise is in photography, sketching, processing latent and patent evidence, which includes fingerprints, footwear impressions, trace, hair & fibers, biological fluid, such as DNA and blood spatter pattern analysis. Police officers, or law enforcement, focuses on protecting the people and property in the community, patrol the areas that they are assigned to, which sometimes can include entire jurisdictions, respond to calls, enforce laws, make arrests, issue citations, and occasionally testify in court…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Crime Scene Investigator

    • 297 Words
    • 2 Pages

    Crime scene investigators “CSIs” go by many names including evidence technician, crime scene technician, forensic investigator, crime scene analyst, criminalistics officer and more. In the past most CSIs were trained police officers. In fact most still work out of police stations today. While CSI professionals collect and preserve evidence from active crime scenes. Forensic lab professionals decipher their findings through DNA testing and other forensic analysis.…

    • 297 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Computer forensics started in the late 1970's when it was determined that there was evidence to be found on computers that could assist in the apprehension or conviction of a suspect. Since then there have been many different ideas as to what is considered the proper process of attaining the data and what is legal for either the government or corporations. Today, almost anyone that you meet will have a cell phone that is a considerably more powerful computer than the one that guided the Apollo space crafts to the moon, and because of this there is an incredible amount of data that could be used in an investigation to clear an innocent suspect or incriminate a guilty one. The three best uses of criminal forensics, in my opinion, are; the murder…

    • 291 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Criminal Investigator Within the U.S. Army In the realm of criminal justice lies the career path of a criminal investigator. These job offers range from working in the sheriff’s department, FBI, or the United States (U.S.) Army. No matter what path one takes within the field, he/she must have a certain set of qualifications and skills. Investigators are inherently important to society in order to maintain order.…

    • 1884 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Served as the Agency’s Chief Information Security Officer (CISO), Senior Technical Advisor for Architecture and Technology, Chief Privacy Official, and Senior COOP planner. Primary functions was the CISO This position was very diverse and encompasses several IT disciplines such as Enterprise Management and operations, application development, information assurance; tactical systems and communication support and COOP. Some accomplishments are: • Developed the agency’s IT risk management plan based on combatant requirements.…

    • 780 Words
    • 4 Pages
    Improved Essays