{"id":11822,"date":"2023-04-14T21:41:00","date_gmt":"2023-04-14T21:41:00","guid":{"rendered":"https:\/\/www.computerscience.org\/?p=11822"},"modified":"2024-04-17T15:50:03","modified_gmt":"2024-04-17T15:50:03","slug":"become-a-computer-forensics-investigator","status":"publish","type":"post","link":"https:\/\/www.computerscience.org\/careers\/computer-forensics-investigator\/how-to-become\/","title":{"rendered":"How to Become a Computer Forensics Investigator"},"content":{"rendered":"<p>Computer forensics investigators usually hold a bachelor's degree and need experience in cybersecurity and forensics. This career field has its origins in law enforcement, where it developed in response to the rise of digital crimes in the 20th and 21st centuries. Consequently, many digital forensics professionals have backgrounds in law enforcement, information technology, or computer science,<\/p>\r\n\r\n\r\n\r\n<h2>What Is a Computer Forensics Investigator?<\/h2>\r\n<p><a href=\"\/careers\/computer-forensics-investigator\/\">Computer forensics investigators<\/a> collect and analyze digital evidence to determine whether it supports investigations and legal cases. They record their findings, write reports, and testify in court. They shift priorities fluidly as details of investigations change. They may also monitor the security of digital information and offer suggestions to improve that security.<\/p>\r\n<p>Unlike many other <a href=\"\/careers\/\">computer science careers<\/a>, computer forensics is a branch of the forensics that law enforcement uses to investigate crimes. Most computer forensics investigators work with law enforcement, state agencies, and federal agencies such as the FBI.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/careers\/computer-forensics-investigator\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn more about computer forensics investigators<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-primary-light\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h2>What Does a Computer Forensics Investigator Do?<\/h2>\r\n<p>Computer forensics investigators search for and examine the evidence in digital crimes. They analyze the data and evidence to determine whether or not the evidence supports the case.<\/p>\r\n<p>Most <a href=\"\/careers\/computer-forensics-investigator\/\">computer forensics investigators<\/a> work for federal and state government agencies or law enforcement agencies. Most often, these agencies are in and around Washington, D.C.<\/p>\r\n<p>In addition to collecting evidence, they write reports on the evidence, take pictures of their findings, and testify in court. They also need to know the procedures, laws, and regulations related to their investigations to properly carry them out.<\/p>\r\n<p>Computer forensics investigators test the security of data and digital information, and recommend changes to make this information more secure.<\/p>\r\n<p>If you&rsquo;re interested in computer forensic investigation, you may also consider similar job titles such as digital forensics analyst and forensic computer analyst.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"education\" id=\"education\"><\/a>\n\n \r\n<h2>Education Requirements for Computer Forensics Investigators<\/h2>\r\n<p>Most computer forensics investigators hold <a href=\"\/degrees\/bachelors\/computer-forensics\/\">bachelor's degree in computer forensics<\/a>, which take four years of full-time study. Though many positions in this field require several years of professional experience, <a href=\"\/degrees\/masters\/non-cs-major\/\">earning an advanced degree<\/a> may reduce the number of years you need to qualify for some jobs.<\/p>\r\n<p>Many computer forensic investigators pursue professional certification to verify their mastery of specific career skills. Often, these credentials require periodic renewal, which may involve continuous work experience in digital forensics and the completion of continuing education credits.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/degrees\/computer-forensics\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore computer forensics degree programs<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"experience\" id=\"experience\"><\/a>\n\n \r\n<h2>Experience Requirements for Computer Forensics Investigators<\/h2>\r\n<p>Many computer forensics investigators pursue experience in law enforcement or information technology. Often, positions require between 18 months to five years of experience. No matter which path you choose, most positions require a four-year bachelor's degree. A <a href=\"\/degrees\/masters\/computer-forensics\/\">master's degree in computer forensics<\/a> may lessen experience requirements.<\/p>\r\n<p>Professionals without a significant background in computers and forensics can complete bootcamps like the certified computer examiner program from the <a href=\"https:\/\/www.cce-bootcamp.com\/\" target=\"_blank\" rel=\"noopener\">International Society of Forensic Computer Examiners<\/a> (ISFCE). This in-person bootcamp lasts a week and leads to a credential that can help professionals qualify for computer forensics careers.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"certifications\" id=\"certifications\"><\/a>\n\n \r\n<h2>Certifications for Computer Forensics Investigators<\/h2>\r\n<p><a href=\"\/degrees\/certifications\/computer-science\/\">Professional certifications<\/a> for computer forensics investigators verify specific skills to employers, demonstrating the training and knowledge acquired from completing a certification course. These credentials can help you stand out in the job search or qualify for pay raises and promotions. Certifications can also help hone your skills in computer forensics if you do not have a technology-related educational background.<\/p>\r\n<p>Popular digital forensic investigator certifications include:<\/p>\r\n<ul>\r\n<li><a href=\"https:\/\/www.giac.org\/certifications\/advanced-smartphone-forensics-gasf\/\" target=\"_blank\" rel=\"noopener\"><strong>GIAC Advanced Smartphone Forensics<\/strong><\/a>: This credential covers key elements of mobile device forensics, including analysis of malware, mobile application behaviors, and file systems.<\/li>\r\n<li><a href=\"https:\/\/www.giac.org\/certifications\/certified-forensic-analyst-gcfa\/\" target=\"_blank\" rel=\"noopener\"><strong>GIAC Certified Forensic Analyst<\/strong><\/a>: This certification verifies expertise in advanced digital forensics and incident response topics, such as memory forensics, anti-forensics detection, and threat hunting.<\/li>\r\n<li><a href=\"https:\/\/www.isfce.com\/certification.html\" target=\"_blank\" rel=\"noopener\"><strong>Certified Computer Examiner<\/strong><\/a>: This credential requires you to complete the official ISFCE certified computer examiner bootcamp or other approved training, accrue 18 months of experience performing digital forensic exams, and document self-study showing you can pass the certification's required assessment. This test covers topics such as writing examination reports, defeating passwords, PC hardware, and networking.<\/li>\r\n<\/ul>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/degrees\/certifications\/computer-science\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover more certifications for computer science professionals<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-primary-light\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n<h2>Learning How to Be a Computer Forensics Investigator<\/h2>\r\n<p>Most computer forensics investigators hold bachelor's degrees in fields like computer science, <a href=\"\/degrees\/information-technology\/\">information technology<\/a>, or criminal justice. Then, they accrue 18 months to 5 years of experience in law enforcement or information technology.<\/p>\r\n<p>Regardless of educational background, these careers require professionals to develop skills in IT and forensics. In addition to on-the-job experience, workers can <a href=\"\/resources\/top-it-certifications\/\">pursue professional certifications<\/a> or advanced degrees to build the requisite body of knowledge for this field.<\/p>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"steps\" id=\"steps\"><\/a>\n\n \r\n<h3>Steps to Becoming a Computer Forensics Investigator<\/h3>\r\n<p>As an aspiring computer forensic investigator, you have two common career paths into the field, each with several steps. Learn more about the paths computer forensics investigators take to start their career below.<\/p>\r\n\r\n<div class=\"grid lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<div>\r\n<h4>Technology Path<\/h4>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Earn a Technology-Related Bachelor's Degree: <\/strong>A bachelor's degree in a technology-related field is designed to teach skills in cybersecurity, incident response, information technology, and computer science.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Gain IT or Cybersecurity Experience<\/strong>: After graduation, find work in information technology or cybersecurity<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Develop Forensics Knowledge<\/strong>: The field of computer forensics requires a combination of forensic science and investigative knowledge in addition to information technology skills. Thus, professionals with a technology background should focus on building their forensics knowledge<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Network with Law Enforcement<\/strong>: By connecting professionally with law enforcement officers and investigators, tech workers can learn more about forensics and criminal investigation. Developing these career networks can also lead to job opportunities<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Earn Certification<\/strong>: Pursuing professional certification in cybersecurity or forensics can hone relevant skills and lead to more career opportunities<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1066E5\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#1066E5\" data-size=\"small\"> <span class=\"text-base\"><strong>Consider an Advanced Degree<\/strong>: Earning an advanced degree may increase salary potential or allow substitution of higher education for required experience when applying for management and senior-level positions<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n<\/div>\r\n\r\n<div>\r\n<h4>Law Enforcement Path<\/h4>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><strong>Complete a Criminal Justice-Related Bachelor's Degree<\/strong>: A bachelor's degree in a criminal justice-related field is designed to develop a foundation of knowledge about the legal system, the criminal mind, forensics, and investigation<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><strong>Get a Job in Law Enforcement: <\/strong>After graduation, find work in law enforcement<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><strong>Develop Forensics Knowledge and IT Skills<\/strong>: Once employed in law enforcement, learn more about forensics techniques and build IT skills<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><strong>Network with Forensics Professionals: <\/strong>Network with investigators and forensics professionals who work with digital evidence to learn about synthesizing forensics and IT knowledge<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><strong>Earn Certification<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#10e7de\" size=\"small\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" data-color=\"#10e7de\" data-size=\"small\"> <span class=\"text-base\"><strong>Consider an Advanced Degree<\/strong><\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n<\/div>\r\n\n<\/div>\n\r\n\r\n<h3>Should I Become a Computer Forensics Investigator?<\/h3>\r\n<p>Aspiring computer forensics investigators should consider many factors before they choose this career. Computer forensics investigators <a href=\"\/careers\/computer-forensics-investigator\/day-in-the-life\/\">play an important role<\/a> in crime investigation and the security of digital information. However, they may encounter sensitive content during their work. They often put in long hours, maintaining flexibility to meet tight deadlines and quickly adapt to new developments in cases.<\/p>\r\n<p>Gaining further experience and education can qualify these professionals for mid- and senior-level positions. Along with added responsibilities, these advanced roles come with more pay. According to <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Forensic_Computer_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale data<\/a> from March 2023, midcareer computer forensics investigators make an average salary of $89,530 &mdash; over $17,000 higher than the $72,290 average their early career counterparts earn.<\/p>\r\n\r\n<div class=\"grid lg:grid-cols-2 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/careers\/computer-forensics-investigator\/career-outlook-and-salary\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Get salary insights for computer forensics investigators<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/careers\/computer-forensics-investigator\/day-in-the-life\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">What does a typical day for a computer forensics investigator look like?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h3 class=\"text-primary-800\">Professional Spotlight: Greg Kelley<\/h3>\r\n\r\n<hr style=\"background:  #533FBE; border:0; height:1px\" \/>\r\n\r\n<h4>What prompted your journey to become a computer forensics investigator?<\/strong><\/h4>\r\n\r\n<p>My company was servicing small and medium businesses as general IT consultants. Some of our clients were mid-sized law firms. The law firms started coming to us with hard drives, wanting us to try to recover deleted files and emails or determine activity on the drives. Our company started looking into this new field, digital forensics, and saw it to be more exciting and it had an exciting future.<\/p>\r\n\r\n<h4>If you work in a particular industry, what prompted this choice and\/or how did it evolve?<\/strong><\/h4>\r\n\r\n<p>We provide digital forensic services to companies in multiple industries and of different sizes.<\/p>\r\n\r\n\r\n<h4>What educational path did you take to become a computer forensics investigator?<\/strong><\/h4>\r\n\r\n<p>My background is a degree in computer engineering. There was not a cybersecurity or digital forensic degree when I went to college. That said, I still believe that a background in computer engineering or computer science sets one up better for forensics or cybersecurity. Every day, I leverage my general knowledge in computers when performing digital forensic services.<\/p>\r\n\r\n<div class=\"pullquote inline-block text-xl font-bold \n\">\n    <p>\"Ultimately, though, it is whether you continually learn that sets you apart from others.\"<\/p>\n<\/div>\n\n\r\n\r\n\r\n<h4>Did you have to pass any certifications or tests to enter the field or progress in your career?<\/strong><\/h4>\r\n\r\n<p>I earned both the EnCase certified examiner (EnCE) and digital forensic certified professional (DFCP). The EnCE required taking a multi-choice application and a practical application. The DFCP required filling out an application and passing a written exam. Both certifications have continuing education requirements. Today, individuals can get degrees in digital forensics or go the path I went. Ultimately, though, it is whether you continually learn that sets you apart from others.<\/p>\r\n\r\n\r\n<h4>What advice do you have for individuals considering becoming a computer forensics investigator?<\/strong><\/h4>\r\n\r\n<p>My first piece of advice is to get an internship while in college. Many companies in this space want people with experience &mdash; an internship is one way to do that. Also, an internship is often like an interview for the company with whom you are interning. If you already have graduated, consider a certification and\/or appropriate training to add to your computer skills. I would say that unless you have experience in the industry or a combination of a degree in the computer field and relevant training\/certification, it will be tough to break in. Most entry-level jobs are usually data collection positions, versus a position that is analyzing the data. So, understanding the different sources of data (cloud, email, workstation, mobile device, etc.) and how to extract data from them is important.<\/p>\r\n\r\n\r\n<h4>What do you wish you'd known before becoming a computer forensics investigator?<\/strong><\/h4>\r\n\r\n<p>Nothing I can think of for me, as I gravitated to the field over time. That said, for someone coming into the field, expect periods of time that involve long hours, sometimes into the evenings or on weekends. This field involves critical deadlines that cannot be broken. Clients expect all resources and times to be dedicated to making those deadlines. While I hate the phrase \"ASAP,\" because it really doesn't impose a deadline, that is quite often how this industry works.<\/p>\r\n\r\n<div class=\"biography flex flex-col justify-center md:justify-start md:flex-row items-center rounded-lg shadow-lg p-8 bg-white \">\n        <img decoding=\"async\" class=\"object-cover mb-8 rounded-lg max-h-60 md:mb-0\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/v1646845250\/Greg_Kelley.jpg\" alt=\"Portrait of Greg Kelley, EnCE, DFCP\" height=\"240\" loading=\"lazy\">\n    <div class=\"md:ml-8\">\n    <h4 class=\"mb-1 font-bold leading-6 biography__title\">Greg Kelley, EnCE, DFCP<\/h4>\n        <div class=\"mt-4 text-lg leading-6 text-gray-500 md:mb-0 md:pb-0\">\n      \r\n  <p slot=\"contentRight\" class=\"text-base\">Greg Kelley, EnCE, DFCP, is a founder and the chief technology officer of Vestige Digital Investigations. He leads Vestige's digital forensic services. His responsibilities include helping to determine strategic direction of the company and overseeing the day-to-day operations and internal information systems infrastructure. He helps in performing as well as managing the digital forensic investigations and leads the members of the Vestige team<\/p>\r\n\r\n  <p slot=\"contentRight\" class=\"text-base\">Greg has over 20 years of experience working in the computer industry, including custom software design and implementation, network management and security, database programming, disaster recovery, and end-user support. For the past 19 years, Greg has helped Vestige become one of the few companies capable of performing comprehensive digital forensic investigations. He has worked on criminal and civil matters covering areas such as intrusion and incident response, intellectual property theft, fraud, and uncovering hidden assets.<\/p>\r\n\n    <\/div>\n          <span class=\"flex items-center max-w-xs my-8\">\n                                  <a class=\"w-6 h-6 p-px mx-2 border rounded-sm text-primary-700 border-box\" href=\"https:\/\/https:\/\/www.linkedin.com\/in\/greg-kelley-650a551\/\" target=\"_blank\" title=\"Greg Kelley, EnCE, DFCP&#039;s LinkedIn\">\n            <svg class=\"text-gray-500 fill-current\" viewBox=\"0 0 25 25\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n              <path d=\"M3.4 6.4C1.6 6.4.5 5.3.5 3.8c0-1.4 1.1-2.6 2.9-2.6s2.9 1.1 2.9 2.6-1.1 2.6-2.9 2.6zM6 23.8H.9V8.5h5.2zm18.3 0h-5.2v-8.2c0-2.1-.8-3.4-2.6-3.4-1.4 0-2.3 1-2.6 1.9-.2.3-.2.8-.2 1.3v8.4h-5c.2-13.9.2-15.3.2-15.3H14v2.3c.6-1.1 1.9-2.6 4.7-2.6 3.4 0 5.8 2.3 5.8 6.9v8.7z\"><\/path>\n            <\/svg>\n          <\/a>\n                      <\/span>\n      <\/div>\n<\/div>\n\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h2>How Much Does a Computer Forensics Investigator Make?<\/h2>\r\n<p>Computer forensics investigators make an average of $75,500 per year, according to <a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Forensic_Computer_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale data<\/a> from March 2023. Computer forensics investigators with skills such as project management, mobile computing, fraud investigation, and digital computing can earn higher salaries.<\/p>\r\n<p>Time in the field can also increase their salary. Computer forensics investigators with five or more years of experience may earn an average salary up to $90,000 a year, according to March 2023 Payscale data.<\/p>\r\n\r\n<div class=\"text-center border-thin bg-secondary-light\" style=\"max-width: fit-content; margin-left: auto; margin-right: auto; padding: 0 100px 0 100px;\">\r\n    <br>\r\n        <sonic-icon icon='currency-dollar' size='large' color='#1066E5'><\/sonic-icon> \r\n    <br>\r\n    <p>Average Annual Salary of Computer Forensics Investigators, March 2023<\/p>\r\n\r\n    <p style=\"font-size: 30px;\"><strong>$75,500<\/strong><\/p>\r\n    <p><strong>Source:<\/strong><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Forensic_Computer_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale<\/a><\/p>\r\n<\/div>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"experience\" id=\"experience\"><\/a>\n\n \r\n<h3>Average Salary for Computer Forensics Investigators by Experience<\/h3>\r\n<p>According to limited Payscale data, computer forensic analyst &mdash; also called forensic computer analysts &mdash; earn more on average based on their experience.<\/p>\r\n<p>Computer forensic investigators may see the highest increases in their pay after they gain five years of experience. Computer forensic investigators with five to nine years of experience earn an average annual salary near $90,000.<\/p>\r\n\r\n\r\n<div id=\"everviz-fQ64u9Pv7\" class=\"everviz-fQ64u9Pv7\"><script src=\"https:\/\/app.everviz.com\/inject\/fQ64u9Pv7\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"education\" id=\"education\"><\/a>\n\n \r\n<h3>Computer Forensics Investigator Salary by Education<\/h3>\r\n<p><a href=\"\/careers\/computer-forensics-investigator\/how-to-become\/\">Future computer forensics investigators<\/a> have several options for training. You can earn a bachelor's or master's degree in cybersecurity, network security, or computer science. You could also attend a bootcamp that offers a quicker pathway into the field.<\/p>\r\n<p>Professionals with a <a href=\"\/degrees\/bachelors\/computer-science\/\">bachelor&rsquo;s of science in computer science<\/a> earn the highest salaries compared to those of similar undergraduate degrees, such as computer forensics.<\/p>\r\n<p>Different types of computer science professionals hold computer science degrees, and some degrees may lead to higher salaries than others. Some of these professionals earn higher salaries than computer forensics investigators.<\/p>\r\n<p>If you choose to get a master&rsquo;s degree, a few of the average salaries for professionals with master's degrees are six figures. This is because of the increased knowledge, hands-on experience, and specialization master's degrees offer.<\/p>\r\n<p>People with a <a href=\"\/degrees\/masters\/\">master's in computer science<\/a>, a master's in computer forensics, or a master of computer science in network security all earn an average of more than $100,000.<\/p>\r\n<p><a class=\"wpil_keyword_link \" href=\"\/bootcamps\/rankings\/best-online-bootcamps\/\"   title=\"Online bootcamps\" data-wpil-keyword-link=\"linked\">Online bootcamps<\/a> may also offer training for computer forensics investigators. You can often complete one of <a href=\"\/bootcamps\/rankings\/cybersecurity\/\">these bootcamps<\/a> in less time than it takes to complete a degree.<\/p>\r\n<p>Bootcamps cover computer science more broadly, or focus on a specific skill set you&rsquo;ll need and how to build it.<\/p>\r\n<p>Because of the differences in your education and skill set, you may earn different pay than other computer forensics specialists who earned a degree.<\/p>\r\n\r\n\r\n<div id=\"everviz-x4vlkfK6X\" class=\"everviz-x4vlkfK6X\"><script src=\"https:\/\/app.everviz.com\/inject\/x4vlkfK6X\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n<br>\r\n\r\n<div id=\"everviz-6YBG4x0OK\" class=\"everviz-6YBG4x0OK\"><script src=\"https:\/\/app.everviz.com\/inject\/6YBG4x0OK\/?v=3\" defer=\"defer\"><\/script><\/div>\r\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h3 class=\"text-center\">\r\n    Discover which education path is right for you:\r\n<\/h3>\r\n  \n\n  <section class=\"cards text-center\" data-cy=\"cards\">\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1662131753\/ComputerScience.org\/GettyImages-1184998952_73526b3e\/GettyImages-1184998952_73526b3e.jpg?_i=AA\"\n        alt=\"Degrees in Computer Forensics\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Degrees in Computer Forensics<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\"><\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/computer-forensics\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1662132065\/ComputerScience.org\/CompSci_BA_ComputerForensics_FTR_32078d8b0\/CompSci_BA_ComputerForensics_FTR_32078d8b0.jpg?_i=AA\"\n        alt=\"Bachelor's Degrees in Computer Forensics\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Bachelor's Degrees in Computer Forensics<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\"><\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/bachelors\/computer-forensics\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1704468932\/ComputerScience.org\/computer-forensic-specialist-works-in-dark-office\/computer-forensic-specialist-works-in-dark-office.jpg?_i=AA\"\n        alt=\"Master's Degrees in Computer Forensics\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Master's Degrees in Computer Forensics<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\"><\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/masters\/computer-forensics\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1662131564\/ComputerScience.org\/bootcamps_8619b5e32\/bootcamps_8619b5e32.svg?_i=AA\"\n        alt=\"Coding Bootcamp Rankings and Reviews\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Coding Bootcamp Rankings and Reviews<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\"><\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/bootcamps\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"location\" id=\"location\"><\/a>\n\n \r\n<h3>Computer Forensics Investigator Salary by Location<\/h3>\r\n<p>Bureau of Labor Statistics (BLS) data shows that Delaware, Colorado, Maryland, Washington, D.C., and Washington offer the highest average salaries for all other <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes150000.htm\" target=\"_blank\" rel=\"noopener\">computer occupations.<\/a><\/p>\r\n<p>This is supported by Payscale, which cites that the three cities paying computer forensics investigators the highest average salaries are Washington D.C., Arlington, Virginia, and Dallas, Texas.<\/p>\r\n<p>The executive branch in the federal government and Silicon Valley in California are two of the biggest employers of computer forensics investigators.<\/p>\r\n<p>This demand for computer forensics investigators contributes to the high salaries in California, Washington, D.C., and the states surrounding Washington, D.C.<\/p>\r\n<p>The cost of living in many of these locations is higher than average. Washington D.C., California, and Maryland have three of the top ten highest costs of living in the country, according to the <a href=\"https:\/\/meric.mo.gov\/data\/cost-living-data-series\" target=\"_blank\" rel=\"noopener\">2021 cost of living index.<\/a><\/p>\r\n\r\n\r\n<table class=\"sonic-table\">\r\n    <caption>Top-Paying Cities for Roles Similar To Computer Forensics Investigators<\/caption>\r\n<tbody>\r\n    <thead>\r\n<tr>\r\n<th>\r\n<strong>State<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Average Annual Wage<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Percent Above the National Average<\/strong>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tr>\r\n<td data-tile=\"State\">\r\n<p>Washington D.C.<\/p>\r\n<\/td>\r\n<td data-tile=\"Average Annual Wage\">\r\n<p>$106,568<\/p>\r\n<\/td>\r\n<td data-tile=\"Percent Above the National Average\">\r\n<p>41.5%<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-tile=\"State\">\r\n<p>Dallas, Texas<\/p>\r\n<\/td>\r\n<td data-tile=\"Average Annual Wage\">\r\n<p>$87,979<\/p>\r\n<\/td>\r\n<td data-tile=\"Percent Above the National Average\">\r\n<p>16.9%<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-tile=\"State\">\r\n<p>Arlington, Virginia<\/p>\r\n<\/td>\r\n<td data-tile=\"Average Annual Wage\">\r\n<p>$84,366<\/p>\r\n<\/td>\r\n<td data-tile=\"Percent Above the National Average\">\r\n<p>12.1%<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align: right;\"><strong>Source:<\/strong><a href=\"https:\/\/www.payscale.com\/research\/US\/Job=Forensic_Computer_Analyst\/Salary\" target=\"_blank\" rel=\"noopener\">Payscale<\/a>, March 2023<\/p>\r\n\r\n\r\n<table class=\"sonic-table\">\r\n    <caption>Top-Paying States for All Other Computer Occupations, May 2023<\/caption>\r\n<tbody>\r\n    <thead>\r\n<tr>\r\n<th>\r\n<strong>State<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Number of 'Other' Computer Employees<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Average Annual Wage<\/strong>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tr>\r\n<td data-tile=\"State\">\r\n<p>Delaware<\/p>\r\n<\/td>\r\n<td data-tile=\"Number of 'Other' Computer Employees\">\r\n<p>1,070<\/p>\r\n<\/td>\r\n<td data-tile=\"Average Annual Wage\">\r\n<p>$142,910<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-tile=\"State\">\r\n<p>Colorado<\/p>\r\n<\/td>\r\n<td data-tile=\"Number of 'Other' Computer Employees\">\r\n<p>7,810<\/p>\r\n<\/td>\r\n<td data-tile=\"Average Annual Wage\">\r\n<p>$140,460<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-tile=\"State\">\r\n<p>Maryland<\/p>\r\n<\/td>\r\n<td data-tile=\"Number of 'Other' Computer Employees\">\r\n<p>21,560<\/p>\r\n<\/td>\r\n<td data-tile=\"Average Annual Wage\">\r\n<p>$134,610<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-tile=\"State\">\r\n<p>Washington D.C.<\/p>\r\n<\/td>\r\n<td data-tile=\"Number of 'Other' Computer Employees\">\r\n<p>16,960<\/p>\r\n<\/td>\r\n<td data-tile=\"Average Annual Wage\">\r\n<p>$131,290<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-tile=\"State\">\r\n<p>Washington<\/p>\r\n<\/td>\r\n<td data-tile=\"Number of 'Other' Computer Employees\">\r\n<p>15,410<\/p>\r\n<\/td>\r\n<td data-tile=\"Average Annual Wage\">\r\n<p>$130,890<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align: right;\"><strong>Source:<\/strong> <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151299.htm\" target=\"_blank\" rel=\"noopener\">BLS<\/a><\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/states-overview\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore computer science programs by state<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"career\" id=\"career\"><\/a>\n\n \r\n<h2>Career Outlook for Computer Forensics Investigators<\/h2>\r\n<p>BLS projects 10% growth for all <a href=\"\/resources\/best-computer-science-jobs\/\">other computer occupations<\/a>. People continue to use technology to store information, which means opportunities for digital crimes will increase. The need for computer forensics investigators will increase with it.<\/p>\r\n<p>Computer forensics investigators can find many opportunities in law enforcement, the federal government, and state governments. They will also find more opportunities in large cities and states.<\/p>\r\n\r\n<div class=\"text-center border-thin bg-primary-light\" style=\"max-width: fit-content; margin-left: auto; margin-right: auto; padding: 0 100px 0 100px;\">\r\n    <br>\r\n        <sonic-icon icon='trending-up' size='large' color='#533FBE'><\/sonic-icon> \r\n    <br>\r\n    <p><strong>Employment Outlook for Computer Forensics Investigators, 2022-2032<\/strong><\/p>\r\n\r\n    <p style=\"font-size: 30px;\"><strong>+10%<\/strong><\/p>\r\n    <p>Source: <a href=\"https:\/\/www.bls.gov\/ooh\/about\/data-for-occupations-not-covered-in-detail.htm\" target=\"_blank\" rel=\"noopener\">BLS<\/a><\/p>\r\n<\/div>\r\n\r\n<h3>Best Locations for Computer Forensics Investigators<\/h3>\r\n<p>Most opportunities for all other computer occupations are in metropolitan areas and large states. California, Texas, and Maryland employ the most professionals in all other computer occupations, including computer forensics investigators. Florida has the most job openings annually between 2018 and 2028.<\/p>\r\n\r\n<table class=\"sonic-table\">\r\n    <caption>Top-Employing States for Roles Similar To Computer Forensics Investigators, May 2023<\/caption>\r\n<tbody>\r\n    <thead>\r\n<tr>\r\n<th>\r\n<strong>Top-Employing States<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Number of Computer Forensics Investigators Employed<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Annual Mean Wage<\/strong>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tr>\r\n<td data-title=\"Top-Employing States\">\r\n<p>California<\/p>\r\n<\/td>\r\n<td data-title=\"Number of Computer Forensics Investigators Employed\">\r\n<p>91,510<\/p>\r\n<\/td>\r\n<td data-title=\"Annual Mean Wage\">\r\n<p>$126,640<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Top-Employing States\">\r\n<p>Texas<\/p>\r\n<\/td>\r\n<td data-title=\"Number of Computer Forensics Investigators Employed\">\r\n<p>59,460<\/p>\r\n<\/td>\r\n<td data-title=\"Annual Mean Wage\">\r\n<p>$106,990<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Top-Employing States\">\r\n<p>Maryland<\/p>\r\n<\/td>\r\n<td data-title=\"Number of Computer Forensics Investigators Employed\">\r\n<p>21,560<\/p>\r\n<\/td>\r\n<td data-title=\"Annual Mean Wage\">\r\n<p>$134,610<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Top-Employing States\">\r\n<p>Pennsylvania<\/p>\r\n<\/td>\r\n<td data-title=\"Number of Computer Forensics Investigators Employed\">\r\n<p>20,230<\/p>\r\n<\/td>\r\n<td data-title=\"Annual Mean Wage\">\r\n<p>$104,710<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"Top-Employing States\">\r\n<p>Washington D.C.<\/p>\r\n<\/td>\r\n<td data-title=\"Number of Computer Forensics Investigators Employed\">\r\n<p>16,960<\/p>\r\n<\/td>\r\n<td data-title=\"Annual Mean Wage\">\r\n<p>$131,290<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align: right;\"><strong>Source:<\/strong> <a href=\"https:\/\/www.bls.gov\/oes\/current\/oes151299.htm\" target=\"_blank\" rel=\"noopener\">BLS<\/a><\/p>\r\n\r\n\r\n<table class=\"sonic-table\">\r\n    <caption>States With the Greatest Projected Increase in Employment for Information Security Analysts, a similar position to Computer Forensics Analysts, 2018-2028<\/caption>\r\n<tbody>\r\n    <thead>\r\n<tr>\r\n<th>\r\n<strong>State<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Percent Projected Change, 2018-28<\/strong>\r\n<\/th>\r\n<th>\r\n<strong>Average Annual Openings<\/strong>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tr>\r\n<td data-title=\"State\">\r\n<p>Utah<\/p>\r\n<\/td>\r\n<td data-title=\"Percent Projected Change, 2018-28\">\r\n<p>59.4%<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Openings\">\r\n<p>160<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"State\">\r\n<p><a href=\"\/online-degrees\/arizona\/\">Arizona<\/a><\/p>\r\n<\/td>\r\n<td data-title=\"Percent Projected Change, 2018-28\">\r\n<p>53%<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Openings\">\r\n<p>590<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"State\">\r\n<p>Florida<\/p>\r\n<\/td>\r\n<td data-title=\"Percent Projected Change, 2018-28\">\r\n<p>52%<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Openings\">\r\n<p>1,080<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"State\">\r\n<p>North Carolina<\/p>\r\n<\/td>\r\n<td data-title=\"Percent Projected Change, 2018-28\">\r\n<p>51.1%<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Openings\">\r\n<p>1,030<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td data-title=\"State\">\r\n<p>Massachusetts<\/p>\r\n<\/td>\r\n<td data-title=\"Percent Projected Change, 2018-28\">\r\n<p>50.7%<\/p>\r\n<\/td>\r\n<td data-title=\"Average Annual Openings\">\r\n<p>570<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p style=\"text-align: right;\"><strong>Source:<\/strong> <a href=\"https:\/\/projectionscentral.org\/Projections\/LongTerm?AreaName=&amp;AreaNameSelect%5B1%5D=1&amp;Name=Information%20Security%20Analysts&amp;NameSelect%5B402%5D=402&amp;items_per_page=10&amp;order=PercentChange&amp;sort=desc&amp;page=0\" target=\"_blank\" rel=\"noopener\">Projections Central<\/a><\/p>\r\n\r\n\r\n<h3>Career Opportunities for Computer Forensics Investigators<\/h3>\r\n<p>As you gain experience as a computer forensic investigator, you can apply for mid-level and senior positions, which may earn higher salaries.<\/p>\r\n<p>Computer forensics investigators also move into other roles in computer science such as security engineer, cyber security analyst, and chief information security officer.<\/p>\r\n<p>Skills like project management, forensics, computer security, and mobile and cloud computing can help you stand out in these roles. Certifications in computer forensics like Certified Forensic Examiner (GCFE) from <a href=\"https:\/\/www.giac.org\/focus-areas\/digital-forensics-incident-response\/\" target=\"_blank\" rel=\"noopener\">Global Information Assurance Certification<\/a> can also help you show your knowledge.<\/p>\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"job-hunt\" id=\"job-hunt\"><\/a>\n\n \r\n<h3>The Job Hunt<\/h3>\r\n<p>As a computer forensics investigator, you can find a mentor, get certified, attend professional development events, and keep up with industry trends to stand out in the job market. You can find jobs in many ways, including:<\/p>\r\n<ul>\r\n<li>Networking with people in information technology and computer forensics<\/li>\r\n<li>Joining professional organizations<\/li>\r\n<li>Attending networking events<\/li>\r\n<li>Working with your school's career services to refine your resume and cover letters<\/li>\r\n<\/ul>\r\n\r\n\r\n<p>Below, we explore several job-related resources:<\/p>\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#23BDFF\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#23BDFF\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.indeed.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Indeed<\/strong><\/a>: Find computer forensics positions with Indeed's recommendations, which can help match you to positions relevant to your skills, experience, and education level.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#23BDFF\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#23BDFF\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.usajobs.gov\/\" target=\"_blank\" rel=\"noopener\"><strong>USAJobs<\/strong><\/a>: USAJobs provides applicants details about open positions within the government, making the site especially relevant for computer forensics investigators looking to work in federal law enforcement. USAJobs offers several search filters to help job-seekers like veterans, military spouses, and people with disabilities find career opportunities.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#23BDFF\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#23BDFF\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.linkedin.com\/\" target=\"_blank\" rel=\"noopener\"><strong>LinkedIn<\/strong><\/a>: In addition to continuing education courses, LinkedIn can connect you to professional communities in information technology, forensics, and other fields. You can find jobs in computer forensics based on your experience level, location, and desired work schedule.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#23BDFF\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#23BDFF\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Google Job Search<\/strong><\/a>: Job seekers can find positions in computer forensics on Google Job Search. Listings are searchable by experience, company, location, and job type.<\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#23BDFF\" size=\"small\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#23BDFF\" data-size=\"small\"> <span class=\"text-base\"><a href=\"https:\/\/www.dice.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Dice<\/strong><\/a>: In addition to technology job postings, Dice offers technology career news, networking opportunities, and <a href=\"https:\/\/app.brazenconnect.com\/events\/JbO3w?utm_medium=dice&amp;utm_source=calendar\" target=\"_blank\" rel=\"noopener\">hiring events<\/a>, including the upcoming \"Secure Your Role in Tech\" cybersecurity networking opportunity in October 2023.<\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n \r\n<h3 class=\"text-center\">Explore Degree Programs in Computer Forensics<\/h3>\r\n  \n\n  <section class=\"cards text-center\" data-cy=\"cards\">\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1662132065\/ComputerScience.org\/CompSci_BA_ComputerForensics_FTR_32078d8b0\/CompSci_BA_ComputerForensics_FTR_32078d8b0.jpg?_i=AA\"\n        alt=\"Best Bachelor's Programs in Computer Forensics\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Best Bachelor's Programs in Computer Forensics<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\"><\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/bachelors\/computer-forensics\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1704468932\/ComputerScience.org\/computer-forensic-specialist-works-in-dark-office\/computer-forensic-specialist-works-in-dark-office.jpg?_i=AA\"\n        alt=\"Best Master's Programs in Computer Forensics\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Best Master's Programs in Computer Forensics<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\"><\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/masters\/computer-forensics\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1662131160\/ComputerScience.org\/GettyImages-533765037_66590e6d\/GettyImages-533765037_66590e6d.jpg?_i=AA\"\n        alt=\"Computer Engineering Degrees\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Computer Engineering Degrees<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\"><\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/computer-engineering-programs\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n<div class=\"cards-item flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/v1662131148\/ComputerScience.org\/CompSci_Degrees_5041dd15c\/CompSci_Degrees_5041dd15c.jpg?_i=AA\"\n        alt=\"Computer Science Degrees\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col justify-between\">\n    <h4 class=\"cards-item__title\">Computer Science Degrees<\/h4>\n    <div class=\"flex flex-col px-4 pb-6\">\n      <p class=\"cards-item__text text-xs leading-6\"><\/p>\n          <\/div>\n    <div class=\"flex flex-col justify-between p-6\">\n      <a class=\"sonic-btn primary\" href=\"https:\/\/www.computerscience.org\/degrees\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\r\n\r\n\r\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-primary-light\">\n    <div class=\"container content\">\n        \r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\n    <\/div>\n<\/section>\n\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n \r\n<h2>Questions About Becoming a Computer Forensics Investigator<\/h2>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">How long does it take to become a computer forensics investigator?<\/mark><\/h3>\r\n            <p>It can take up to six years to become a computer forensics investigator. After earning a bachelor's degree in computer science, criminal justice, or a related field, which usually takes four years of full-time study, you need to earn around two years of related experience to get a job as a computer forensics investigator.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">What degree is needed to work in computer forensics?<\/mark><\/h3>\r\n            <p>To work in computer forensics, you'll need a bachelor's degree in computer science, criminal justice, or a related field.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">Does a career in computer forensics require math?<\/mark><\/h3>\r\n            <p>Because computer forensics investigators decrypt data and work with computer programs that are based in algebra and calculus, these careers often require math skills.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">Are the steps to becoming a computer forensics investigator hard?<\/mark><\/h3>\r\n            <p>As with any career, there are challenges involved in becoming a computer forensic investigator. The profession requires more education and experience than some other computer science positions. Successful workers in this field must master and synthesize concepts from both forensics and information technology.<\/p>        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>","protected":false},"excerpt":{"rendered":"Interested in working as a computer forensics investigator? Use this guide to learn how to become a computer forensics investigator, including education and experience requirements.","protected":false},"author":56,"featured_media":11824,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[54],"bootcamps":[],"states":[],"resources":[],"careers":[],"degrees":[],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/11822"}],"collection":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/comments?post=11822"}],"version-history":[{"count":6,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/11822\/revisions"}],"predecessor-version":[{"id":13580,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/posts\/11822\/revisions\/13580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/media\/11824"}],"wp:attachment":[{"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/media?parent=11822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/categories?post=11822"},{"taxonomy":"bootcamps","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/bootcamps?post=11822"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/states?post=11822"},{"taxonomy":"resources","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/resources?post=11822"},{"taxonomy":"careers","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/careers?post=11822"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.computerscience.org\/wp-json\/wp\/v2\/degrees?post=11822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}