< Back to Careers


Core Skills
Architecture, administration, and management of operating systems (various Linux distros, Windows, etc.), networking, and virtualization software. Remediation Vulnerability Assessments Risk Management Firewalls Java, C/C++, disassemblers, assembly language, and scripting languages (PHP, Python, Perl, or shell
Power Competencies
Excellent presentation and communications skills to effectively communicate with management and customers; Ability to clearly articulate complex concepts (both written and verbally).; Ability, understanding, and usage of active listening skillsĀ  Analytical thinking


COMPTIA Network +, Security +, C, Python, C+ PLUS COMPTIA CySA+, Project +, CISM, Pentest+, CEH,, ISACA,(SANS, GIAC), CISCO (CCT, CCNA, CCHE)

Educational Providers

Public and private 2-year and 4-year colleges, universities Bootcamps & technical Centers Certification entities such as COMPTIA, Microsoft, Google, ITIL

Ohio Median Salary


A Forensics Analyst...

Generally conducts inquiries and investigations into what happened when a breach has been identified . Establishes documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.

Alternative Titles



You should be: Skilled in all aspects of network and asset intrusion techniques with BS and at least intermediate industry certifications Able to investigate potential cyberattacks using various tools Able to communicate effectively with all levels of the organization to inform and educate on cyber risks and mitigation techniques