Degree versus certification: Entry-level cybercrime analyst/investigator


Cybersecurity is a great career choice for those who have passion for information security and helping others with it. The role of cybercrime analyst takes this passion for information security a bit further and hybridizes it with cybercrime investigation techniques, concepts and practices, making the professional holding the role a formidable force against malicious attackers. 

You may have made it this far in choosing your career, but have you considered how to get to this role the fastest? This role requires either a degree or certification to be hired, but one path may be better for your than the other. 

AWS Builder Community Hub

This article will detail both the degree and certification paths to becoming an entry-level cybercrime analyst/investigator and will conclude with my considered opinion about which path to take.

Cybercrime analyst/investigator

Have you ever wanted to combine information security skills with crime-fighting skills to help organizations deal with the ever-growing menace of cyberthreats? This sort of hybrid dream job is no dream and it is not a grimy gumshoe gig, either. Rather, this cybersecurity specialization draws on these two skill sets to tackle some of the most daunting cybercrime challenges, often where conventional cybersecurity skills fail to prevail. Organizations and their security teams know their cybercrime analyst/investigator is up to the task. 

This role is often referred to by many different names, including:

  • Cybercrime analyst
  • Cybercrime investigator
  • Computer crime analyst/investigator
  • Computer forensics analyst
  • Cyber forensics analyst

One of the best selling points of this role (to those still on the fence) is that the United States Bureau of Labor Statistics has forecast this role to grow by 28% between the years of 2016 and 2026. With statistics like these, you can rest assured that there will be jobs in this role around for years to come.

Degree (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: