A. Forensic Examiner
Analyzes digital evidence and provides scientific conclusions for the justice system by providing analytical assistance and expert opinion used during law enforcement investigations, criminal court cases, civil court cases and regulatory proceedings.
B. Computer Forensic Analyst Analyst’s
Role is to recover data such as documents, photos, and emails from computer hard drives and other data storage devices, such as zip and flash drives, that have been deleted, corrupted or manipulated. Analysts often work on cases involving breaches committed on the Internet (‘ cyber crimes ‘) and examine computers that may be involved in other types of crime for evidence of illegal activity.
C. Security Designer or Security Architect
Role in reviewing system security measures, access rights, recovery and response to current incidents and recommending, implementing improvements as well as continuous monitoring.
D. Security Risk Analysis and Management
Work in this field has the main competence, namely assessing threats and vulnerabilities related to information assets and then determining, recommending, and managing access to security controls to deal with challenges in the information system.
E. Network security analyst
Jobs in this field have core competencies in managing network security design, enforcing policies by updating and configuring security on an ongoing basis. In addition, it also plays a role in monitoring network traffic in order to analyze potential incidents.
Jobs in this field have competence in providing educational guidance and assistance to students in the forensic field by planning schedules, recommending courses and determining appropriate educational solutions for a diverse range of students. In addition, they must also play a role in research and community service which is linear with the fields of forensics and data security.