{"id":3954,"date":"2025-02-14T13:06:57","date_gmt":"2025-02-14T18:06:57","guid":{"rendered":"https:\/\/www.marshall.edu\/cos\/?page_id=3954"},"modified":"2025-08-06T12:00:20","modified_gmt":"2025-08-06T17:00:20","slug":"cyber-forensics-security","status":"publish","type":"page","link":"https:\/\/www.marshall.edu\/cos\/studentservices\/careers\/cyber-forensics-security\/","title":{"rendered":"Careers for Cyber Forensics &amp; Security"},"content":{"rendered":"<p>At Marshall University, our <a href=\"https:\/\/www.marshall.edu\/academics\/programs\/cyber-forensics-and-security-bs\/\">Cyber Forensics &amp; Security<\/a> program offers a comprehensive and dynamic education that prepares you for a wide range of careers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3955\" src=\"http:\/\/www.marshall.edu\/cos\/files\/careers-wordcloud-cyber-forensics-security.png\" alt=\"A word cloud featuring various careers in cyber forensics and security. Prominent words include Cybersecurity Analyst, Digital Forensics Investigator, and Network Security Administrator.\" width=\"1486\" height=\"1696\" srcset=\"https:\/\/www.marshall.edu\/cos\/files\/careers-wordcloud-cyber-forensics-security.png 1486w, https:\/\/www.marshall.edu\/cos\/files\/careers-wordcloud-cyber-forensics-security-263x300.png 263w, https:\/\/www.marshall.edu\/cos\/files\/careers-wordcloud-cyber-forensics-security-897x1024.png 897w\" sizes=\"auto, (max-width: 1486px) 100vw, 1486px\" \/><\/p>\n<h2>Career Fields &amp; Popular Careers<\/h2>\n<div class=\"marsha-row mt-4 mb-4 flex flex-wrap -mx-2 lg:-mx-6  justify-start border-0 border-gray-100 first:mt-0\">\n\t<div class=\"columns w-full lg:w-6\/12  lg:px-6    mt-6\">\n\n\n\t\t\t<div class=\"card flex flex-col rounded-lg overflow-hidden relative transition-all duration-200 ease-out shadow-sm self-stretch\">\n\t\n\t\t\t\t<div class=\"absolute top-0 left-0 right-0 h-1 bg-linear-to-r from-green to-green-bright\"><\/div>\n\n\t\t<div class=\"p-6 pb-0 pt-7 bg-gray-50\">\n\t\t\t\n\t\t\t<div class=\"uppercase font-bold text-lg tracking-wider leading-tight text-gray-900\">\n\t\t\t\tCybersecurity Analysis &amp; Investigation\n\t\t\t<\/div>\n\n\t\t\t<div class=\"h-0.75 mt-4 w-10 bg-green\"><\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<div class=\"relative bg-gray-50\">\n\t\t\t\t<div class=\"px-6 pt-4\">\n\t\t\t\t\t<div class=\"relative rounded-lg overflow-hidden\">\n\t\t\t\t\t\t<div aria-hidden=\"true\" class=\"absolute inset-0 z-1 m-4 border rounded-lg pointer-events-none border-green\"><\/div>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-analysis.jpg\"\n\t\t\t\t\t\t\tsrcset=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-analysis-300x200.jpg&#x20;300w,&#x20;https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-analysis.jpg&#x20;900w\"\n\t\t\t\t\t\t\talt=\"Cybersecurity Analysis &amp; Investigation\"\n\t\t\t\t\t\t\tclass=\"w-full object-cover h-48\"\n\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%;\"\n\t\t\t\t\t\t\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t<div class=\"px-6 pt-4 pb-7 flex flex-1 flex-col styled-list text-[15px] bg-gray-50 text-gray-500\">\n\t\t\t\t\t\t\t<div class=\"flex-1\">\n<p>Careers focused on analyzing security threats, investigating cyber crimes, and ensuring the integrity of digital evidence.<\/p>\n<p><strong>Popular Careers<\/strong><\/p>\n<ul>\n<li>Cybersecurity Analyst &#8211; Monitors and analyzes security systems to detect and respond to threats.<\/li>\n<li>Digital Forensics Investigator &#8211; Investigates cyber crimes and analyzes digital evidence.<\/li>\n<li>Incident Responder &#8211; Responds to and mitigates cybersecurity incidents.<\/li>\n<\/ul>\n<p><strong>Career Information<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.actfi.org\/\">Association of Cyber Forensics and Threat Investigators (ACFTI)<\/a><\/li>\n<li><a href=\"https:\/\/www.iacis.com\/\">International Association of Computer Investigative Specialists (IACIS)<\/a><\/li>\n<li><a href=\"https:\/\/www.htcia.org\/\">High Technology Crime Investigation Association (HTCIA)<\/a><\/li>\n<\/ul>\n<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t<\/div>\n\t\n\n<\/div>\n<div class=\"columns w-full lg:w-6\/12  lg:px-6    mt-6\">\n\n\n\t\t\t<div class=\"card flex flex-col rounded-lg overflow-hidden relative transition-all duration-200 ease-out shadow-sm self-stretch\">\n\t\n\t\t\t\t<div class=\"absolute top-0 left-0 right-0 h-1 bg-linear-to-r from-green to-green-bright\"><\/div>\n\n\t\t<div class=\"p-6 pb-0 pt-7 bg-gray-50\">\n\t\t\t\n\t\t\t<div class=\"uppercase font-bold text-lg tracking-wider leading-tight text-gray-900\">\n\t\t\t\tNetwork &amp; Information Security\n\t\t\t<\/div>\n\n\t\t\t<div class=\"h-0.75 mt-4 w-10 bg-green\"><\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<div class=\"relative bg-gray-50\">\n\t\t\t\t<div class=\"px-6 pt-4\">\n\t\t\t\t\t<div class=\"relative rounded-lg overflow-hidden\">\n\t\t\t\t\t\t<div aria-hidden=\"true\" class=\"absolute inset-0 z-1 m-4 border rounded-lg pointer-events-none border-green\"><\/div>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-network.jpg\"\n\t\t\t\t\t\t\tsrcset=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-network-300x200.jpg&#x20;300w,&#x20;https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-network.jpg&#x20;900w\"\n\t\t\t\t\t\t\talt=\"Network &amp; Information Security\"\n\t\t\t\t\t\t\tclass=\"w-full object-cover h-48\"\n\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%;\"\n\t\t\t\t\t\t\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t<div class=\"px-6 pt-4 pb-7 flex flex-1 flex-col styled-list text-[15px] bg-gray-50 text-gray-500\">\n\t\t\t\t\t\t\t<div class=\"flex-1\">\n<p>Careers that focus on securing networks, managing security protocols, and ensuring the protection of information systems.<\/p>\n<p><strong>Popular Careers<\/strong><\/p>\n<ul>\n<li>Network Security Administrator &#8211; Manages and secures network infrastructure.<\/li>\n<li>Information Security Analyst &#8211; Protects an organization&#8217;s information systems from cyber threats.<\/li>\n<li>Security Architect &#8211; Designs and implements secure network solutions.<\/li>\n<\/ul>\n<p><strong>Career Information<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/issa.org\/\">Information Systems Security Association (ISSA)<\/a><\/li>\n<li><a href=\"https:\/\/isc2.org\/\">International Information System Security Certification Consortium (ISC)\u00b2<\/a><\/li>\n<li><a href=\"https:\/\/www.sans.org\/\">SANS Institute<\/a><\/li>\n<\/ul>\n<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t<\/div>\n\t\n\n<\/div>\n\n<\/div>\n\n<div class=\"marsha-row mt-4 mb-4 flex flex-wrap -mx-2 lg:-mx-6  justify-start border-0 border-gray-100 first:mt-0\">\n\t<div class=\"columns w-full lg:w-6\/12  lg:px-6    mt-6\">\n\n\n\t\t\t<div class=\"card flex flex-col rounded-lg overflow-hidden relative transition-all duration-200 ease-out shadow-sm self-stretch\">\n\t\n\t\t\t\t<div class=\"absolute top-0 left-0 right-0 h-1 bg-linear-to-r from-green to-green-bright\"><\/div>\n\n\t\t<div class=\"p-6 pb-0 pt-7 bg-gray-50\">\n\t\t\t\n\t\t\t<div class=\"uppercase font-bold text-lg tracking-wider leading-tight text-gray-900\">\n\t\t\t\tSecurity Consulting &amp; Compliance\n\t\t\t<\/div>\n\n\t\t\t<div class=\"h-0.75 mt-4 w-10 bg-green\"><\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<div class=\"relative bg-gray-50\">\n\t\t\t\t<div class=\"px-6 pt-4\">\n\t\t\t\t\t<div class=\"relative rounded-lg overflow-hidden\">\n\t\t\t\t\t\t<div aria-hidden=\"true\" class=\"absolute inset-0 z-1 m-4 border rounded-lg pointer-events-none border-green\"><\/div>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-consulting.jpg\"\n\t\t\t\t\t\t\tsrcset=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-consulting-300x200.jpg&#x20;300w,&#x20;https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-consulting.jpg&#x20;900w\"\n\t\t\t\t\t\t\talt=\"Security Consulting &amp; Compliance\"\n\t\t\t\t\t\t\tclass=\"w-full object-cover h-48\"\n\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%;\"\n\t\t\t\t\t\t\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t<div class=\"px-6 pt-4 pb-7 flex flex-1 flex-col styled-list text-[15px] bg-gray-50 text-gray-500\">\n\t\t\t\t\t\t\t<div class=\"flex-1\">\n<p>Careers that provide expert advice on security measures, ensure compliance with regulations, and assess vulnerabilities.<\/p>\n<p><strong>Popular Careers<\/strong><\/p>\n<ul>\n<li>Security Consultant &#8211; Provides expert advice on security strategies and solutions.<\/li>\n<li>Vulnerability Assessor &#8211; Identifies and assesses security vulnerabilities in systems.<\/li>\n<li>Cybersecurity Compliance Officer &#8211; Ensures that organizations comply with cybersecurity regulations and standards.<\/li>\n<\/ul>\n<p><strong>Career Information<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.iapsc.org\/\">International Association of Professional Security Consultants (IAPSC)<\/a><\/li>\n<li><a href=\"https:\/\/www.isaca.org\">ISACA<\/a><\/li>\n<li><a href=\"https:\/\/www.owasp.org\/\">Open Web Application Security Project (OWASP)<\/a><\/li>\n<\/ul>\n<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t<\/div>\n\t\n\n<\/div>\n<div class=\"columns w-full lg:w-6\/12  lg:px-6    mt-6\">\n\n\n\t\t\t<div class=\"card flex flex-col rounded-lg overflow-hidden relative transition-all duration-200 ease-out shadow-sm self-stretch\">\n\t\n\t\t\t\t<div class=\"absolute top-0 left-0 right-0 h-1 bg-linear-to-r from-green to-green-bright\"><\/div>\n\n\t\t<div class=\"p-6 pb-0 pt-7 bg-gray-50\">\n\t\t\t\n\t\t\t<div class=\"uppercase font-bold text-lg tracking-wider leading-tight text-gray-900\">\n\t\t\t\tCybersecurity Engineering &amp; Development\n\t\t\t<\/div>\n\n\t\t\t<div class=\"h-0.75 mt-4 w-10 bg-green\"><\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<div class=\"relative bg-gray-50\">\n\t\t\t\t<div class=\"px-6 pt-4\">\n\t\t\t\t\t<div class=\"relative rounded-lg overflow-hidden\">\n\t\t\t\t\t\t<div aria-hidden=\"true\" class=\"absolute inset-0 z-1 m-4 border rounded-lg pointer-events-none border-green\"><\/div>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-engineering.jpg\"\n\t\t\t\t\t\t\tsrcset=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-engineering-300x200.jpg&#x20;300w,&#x20;https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-engineering.jpg&#x20;900w\"\n\t\t\t\t\t\t\talt=\"Cybersecurity Engineering &amp; Development\"\n\t\t\t\t\t\t\tclass=\"w-full object-cover h-48\"\n\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%;\"\n\t\t\t\t\t\t\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t<div class=\"px-6 pt-4 pb-7 flex flex-1 flex-col styled-list text-[15px] bg-gray-50 text-gray-500\">\n\t\t\t\t\t\t\t<div class=\"flex-1\">\n<p>Careers focused on developing and implementing security technologies, securing applications, and managing security operations.<\/p>\n<p><strong>Popular Careers<\/strong><\/p>\n<ul>\n<li>Cloud Security Engineer &#8211; Secures cloud-based systems and applications.<\/li>\n<li>Application Security Engineer &#8211; Ensures the security of software applications.<\/li>\n<li>Secure Software Developer &#8211; Develops software with a focus on security.<\/li>\n<\/ul>\n<p><strong>Career Information<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.org\/\">Cloud Security Alliance (CSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.trustwave.com\/en-us\/\" target=\"_blank\" rel=\"noopener\">Trustwave<\/a><\/li>\n<li><a href=\"https:\/\/www.iacr.org\/\">International Association for Cryptologic Research (IACR)<\/a><\/li>\n<\/ul>\n<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t<\/div>\n\t\n\n<\/div>\n\n<\/div>\n\n<div class=\"marsha-row mt-4 mb-4 flex flex-wrap -mx-2 lg:-mx-6  justify-start border-0 border-gray-100 first:mt-0\">\n\t<div class=\"columns w-full lg:w-6\/12  lg:px-6    mt-6\">\n\n\n\t\t\t<div class=\"card flex flex-col rounded-lg overflow-hidden relative transition-all duration-200 ease-out shadow-sm self-stretch\">\n\t\n\t\t\t\t<div class=\"absolute top-0 left-0 right-0 h-1 bg-linear-to-r from-green to-green-bright\"><\/div>\n\n\t\t<div class=\"p-6 pb-0 pt-7 bg-gray-50\">\n\t\t\t\n\t\t\t<div class=\"uppercase font-bold text-lg tracking-wider leading-tight text-gray-900\">\n\t\t\t\tCybersecurity Management &amp; Policy\n\t\t\t<\/div>\n\n\t\t\t<div class=\"h-0.75 mt-4 w-10 bg-green\"><\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<div class=\"relative bg-gray-50\">\n\t\t\t\t<div class=\"px-6 pt-4\">\n\t\t\t\t\t<div class=\"relative rounded-lg overflow-hidden\">\n\t\t\t\t\t\t<div aria-hidden=\"true\" class=\"absolute inset-0 z-1 m-4 border rounded-lg pointer-events-none border-green\"><\/div>\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-management.jpg\"\n\t\t\t\t\t\t\tsrcset=\"https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-management-300x200.jpg&#x20;300w,&#x20;https&#x3A;&#x2F;&#x2F;www.marshall.edu&#x2F;cos&#x2F;files&#x2F;careers-cyber-management.jpg&#x20;900w\"\n\t\t\t\t\t\t\talt=\"Cybersecurity Management &amp; Policy\"\n\t\t\t\t\t\t\tclass=\"w-full object-cover h-48\"\n\t\t\t\t\t\t\tstyle=\"object-position: 50% 50%;\"\n\t\t\t\t\t\t\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t<div class=\"px-6 pt-4 pb-7 flex flex-1 flex-col styled-list text-[15px] bg-gray-50 text-gray-500\">\n\t\t\t\t\t\t\t<div class=\"flex-1\">\n<p>Careers that involve managing cybersecurity programs, developing policies, and overseeing security operations.<\/p>\n<p><strong>Popular Careers<\/strong><\/p>\n<ul>\n<li>Chief Information Security Officer (CISO) &#8211; Oversees an organization&#8217;s cybersecurity strategy and operations.<\/li>\n<li>Cybersecurity Risk Manager &#8211; Manages and mitigates cybersecurity risks.<\/li>\n<li>Cybersecurity Policy Advisor &#8211; Develops and advises on cybersecurity policies and regulations.<\/li>\n<\/ul>\n<p><strong>Career Information<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.staysafeonline.org\/\">National Cyber Security Alliance (NCSA)<\/a><\/li>\n<li><a href=\"https:\/\/www.cisecurity.org\/\">Center for Internet Security (CIS)<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a><\/li>\n<\/ul>\n<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t<\/div>\n\t\n\n<\/div>\n\n<\/div>\n\n<p>&nbsp;<\/p>\n\t\t<a href=\"https:\/\/www.marshall.edu\/academics\/programs\/cyber-forensics-and-security-bs\/\" target=\"_self\" class=\"button button--secondary \">\n\t\t<span>Discover Cyber Forensics and Security<\/span>\n\t<\/a>\n\t\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Marshall University, our Cyber Forensics &amp; Security program offers a comprehensive and dynamic education that prepares you for a wide range of careers. Career Fields &amp; Popular Careers &nbsp; &nbsp;<\/p>\n","protected":false},"author":224,"featured_media":0,"parent":896,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-3954","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/pages\/3954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/users\/224"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/comments?post=3954"}],"version-history":[{"count":7,"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/pages\/3954\/revisions"}],"predecessor-version":[{"id":4619,"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/pages\/3954\/revisions\/4619"}],"up":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/pages\/896"}],"wp:attachment":[{"href":"https:\/\/www.marshall.edu\/cos\/wp-json\/wp\/v2\/media?parent=3954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}