Digital Forensics Specialty Area Qualification Matrix *
Associated Work Roles
- Forensics Analyst (211)
- Cyber Defense Forensics Analyst (212)
Note: This page presents the qualification requirements at the Specialty Area level, a summary category one level above work roles. Until the qualification requirements for the Work Roles are released, please refer to the Specialty Area qualification table below for information. This table will be updated to reflect the specific Work Role requirements when the information is available.
Specialty Area Framework Category: Investigate
Specialty Areas responsible for investigating cyber events or crimes related to information technology (IT) systems, networks, and digital evidence.
Digital Forensics Description
Collects, processes, preserves, analyzes, and presents digital-related evidence to support network vulnerability mitigation and/or civil, workplace, counterintelligence, or law enforcement (e.g., criminal, fraud) investigations.
Example Job/Billet Titles
- Computer Forensic Analyst
- Computer Network Defense (CND) Analyst
- Digital Forensic Examiner
- Digital Media Collector
- Forensic Analyst
- Forensic Analyst (Cryptologic)
- Forensic Technician
- Network Forensic Examiner
Master Tasks and KSAs
Detailed information on the Tasks and Knowledge, Skills and Abilities (KSAs) associated with each Navy Specialty Area can be found in the Master Task & KSA List spreadsheet on the NAVIFOR website (requires credentials/CAC to access) or on the DoD Cyber Exchange website.
Initial Training
Initial training qualification for a specialty area is generally met by a High School diploma or equivalent and completion of Navy "A" school (for Navy enlisted).
Minimum Credential Requirement
You must meet one of the education, training, or certification requirements in the Qualifications Table below. See “Understanding Qualifications” on the Qualifications Table for more information on the order of precedence for the minimum credential requirement.
Qualifying Degrees
The Qualifications Table below includes college degrees in the Education section. For example, "Bachelor degree from accredited University." To view a list of degree programs that are acceptable for this Specialty Area, click List of Qualifying Degrees below or the Information icon in the Qualifications Table.
List of Qualifying Degrees
Degree Program | Degree Area Examples |
---|---|
Applied Mathematical Sciences |
|
Applied Science |
|
Computer Applications |
|
Computer Engineering |
|
Computer Forensics |
|
Computer Information Systems |
|
Computer Network Systems |
|
Computer Science |
|
Cyber Security |
|
Data Communication Systems Technology |
|
Educational Technology |
|
Electrical Engineering |
|
Engineering |
|
Engineering Management |
|
Engineering Physics |
|
Engineering Technology |
|
Industrial Engineering |
|
Information Assurance |
|
Information Management |
|
Information System Management |
|
Information Systems |
|
Information Systems Administration |
|
Information Systems and Cybersecurity |
|
Information Systems Security |
|
Information Systems Technology |
|
Information Technology |
|
Information Technology - Computer Network Systems |
|
Information Technology - Software Applications & Programming |
|
Information Technology - Web Development |
|
International Affairs |
|
International Public Policy |
|
International Relations |
|
International Studies |
|
Jurisprudence |
|
Law |
|
Library and Information Science |
|
Mathematics |
|
Mathematics and Computer Science |
|
Mechanical Engineering |
|
Medical Technology |
|
Military Art and Science |
|
Mobile Communications Technology |
|
Network and Communications Management |
|
Network Systems Administration |
|
Physics |
|
Quality Assurance |
|
Real-Time Interactive Simulation |
|
Research |
|
Science |
|
Software Applications Development |
|
Software Development |
|
Software Development Technology |
|
Software Engineering |
|
Software Engineering Technology |
|
Statistics |
|
Systems Engineering |
|
Technology |
|
Qualifications Table
Basic | Intermediate | Advanced |
---|---|---|
Associate Degree from accredited University | Bachelor Degree from accredited University | Graduate Degree from accredited University |
NEC 746A Information Systems Technician (IAT II) | NEC 742A Network Security Vulnerability Technician | NEC 742A Network Security Vulnerability Technician |
NEC H10A Basic Cyber Analyst/Operator | NEC H10A Basic Cyber Analyst/Operator | NEC H10A Basic Cyber Analyst/Operator |
JQR (Computer Network Defense Intelligence Analysis - watch) | JQR (Threat) | NAVEDTRA 43350 (Malware) |
JQR (Intrusion Detection Analyst - Sensor OPS) | NAVEDTRA 43355-1 - Watchstation 303 - Navy Networks | With privileged access- NAVEDTRA 43469 Watchstation 303 - Information Assurance Technician Level III |
NAVEDTRA 43355-1 - Watchstation 301 - Navy Networks | NAVEDTRA 43355-1 - Watchstation 304 - Navy Networks | |
With privileged access- NAVEDTRA 43469 Watchstation 301 - Information Assurance Technician Level I | NAVEDTRA 43355-1 - Watchstation 305 - Navy Networks | |
NAVEDTRA 43469 Watchstation 301 - Information Assurance Technician Level I | ||
With privileged access- NAVEDTRA 43469 Watchstation 302 - Information Assurance Technician Level II |
*If you have recommendations for degrees, qualifications, NECs or credentials for this matrix, direct them to NAVIFOR (requires credentials/CAC to access). Questions and recommendations regarding the Cyber IT/CSWF model, matrix, policies, implementation guidelines, and compliance should be directed to: Navy_CSWF_Program_Helpline@navy.mil