Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
Change
Job Openings
Looking for colleges that offer a specific major? Use the College Match Tool to find your best-matched schools and discover your estimated Net Price!
Degrees Granted
Female Students
Male Students
Median Starting Salary
Degrees Granted
Female Students
Male Students
Median Starting Salary
Degrees Granted
Female Students
Male Students
Median Starting Salary
Degrees Granted
Female Students
Male Students
Median Starting Salary
Degrees Granted
Female Students
Male Students
Median Starting Salary
This page includes data from:
Career data: O*NET 30.0 Database
by the U.S. Department of Labor, Employment and Training Administration (“USDOL/ETA”). Used under the CC BY 4.0 license. O*NET® is a trademark of USDOL/ETA
Occupation statistics: USDOL U.S. Bureau of Labor Statistics Occupational Employment Statistics