Digital Forensics Analyst

Location: Fort Smith, Arkansas
Department: Digital Forensics
Share This Role

Position Summary

Guardian Forensics is seeking a detail-oriented and technically proficient Digital Forensics Analyst to join our team at the Junior, Intermediate, or Senior level. This role is a step above the Technician position and is designed for an examiner who can move beyond evidence handling into investigative forensics, defensible analysis, timeline development, investigative reporting, and direct support to attorneys, corporate clients, and internal leadership.

The Analyst will work with computers, mobile devices, cloud data, removable media, and related digital evidence both in the laboratory and, when needed, in the field. Case assignments span criminal, civil, corporate investigation, incident response, eDiscovery, insider threat, intellectual property, and white-collar matters. As the Analyst advances in level, they assume increasing autonomy, report ownership, and responsibility for mentoring junior staff.

Role Emphasis: Approximately 50% evidence processing & quality documentation | 50% analysis, reporting & case support

Analyst Level Tiers

Junior Analyst Intermediate Analyst Senior Analyst
Compensation ~$22–$28/hr. ~$28–$36/hr. ~$36–$40+/hr.
Experience 0–2 years 2–4 years 6+ years
Case Autonomy Supervised; guided workflow Independent; peer-reviewed reports Leads cases; mentors team
Processing / Analysis 60% Processing / 40% Analysis 50% Processing / 50% Analysis 40% Processing / 60% Analysis
Testimony Observes / assists Supports and provide expert testimony Provides expert testimony
Field Role Assists senior staff Participates independently Leads field deployments and investigations

Role Distinction

Dimension Technician Analyst
Responsibility Split 70% Processing / 30% Analysis 50% Processing / 50% Analysis
Case Ownership Works under direct supervision Manages own case workflow independently
Report Authorship Draft reports — senior-reviewed Primary author — peer-reviewed
Tool Proficiency Training phase / working knowledge Advanced; trains and guides Technicians
Expert Testimony Observes / assists Supports or provides testimony (by level)
Field Deployments Assists senior staff Participates or leads (by level)
eDiscovery Learns fundamentals Executes full eDiscovery workflows
Research & Writing Independent study projects Authors white papers, How-To’s, SOPs
Incident Response Intro-level support Active IR team participant

Key Responsibilities

Evidence Handling & Chain of Custody

Collect, preserve, image, process, and document digital evidence from computers, mobile devices, removable media, cloud platforms, and related sources using legally defensible methods.

Maintain accurate chain-of-custody records, evidence logs, intake documentation, processing notes, and case activity records throughout the evidence lifecycle.

Ensure forensic integrity through verified acquisition using hardware write-blockers (Tableau TX1 and equivalent) and validated imaging workflows.

Oversee evidence storage, lab organization, and deployment kit readiness; assist in maintaining forensic workstation and hardware currency.

Forensic Examination & Analysis

Conduct forensic examinations to identify user activity, file access, timeline events, communications, application usage, external device activity, cloud synchronization, and other artifacts relevant to the scope of work.

Use forensic tools including Cellebrite, Magnet AXIOM, FTK, EnCase, Tableau hardware, MetaSpike, and Intella to acquire, parse, validate, and review data across computer, mobile, and cloud environments.

Perform advanced analysis including timeline reconstruction, artifact correlation, deleted/encrypted data recovery, and mobile application artifact interpretation.

Support incident response engagements including endpoint triage, log analysis, and breach scoping.

Execute eDiscovery workflows including data processing, culling, tagging, and production in coordination with legal teams.

Assist with trade secret and intellectual property matters, insider threat investigations, business email compromise, and white-collar engagements.

Reporting & Expert Testimony

Prepare clear, written reports, examiner notes, case summaries, and supporting exhibits suitable for attorney review, corporate stakeholders, and potential court use — authored to legally defensible standards.

Translate complex technical findings into accessible language for non-technical audiences including juries, executives, and opposing counsel.

Author or contribute to white papers, How-To documentation, and internal research projects as assigned by senior examiners or leadership.

Peer-review reports and examiner notes produced by Technicians; provide constructive, standards-based feedback.

Provide expert witness testimony in depositions, hearings, and trials as proficiency and experience level permit.

Investigative Support & Team Development

Assist senior examiners and leadership with investigative strategy, issue spotting, quality review, and follow-up analysis on active matters.

Participate in field collections, on-site preservation work, and remote response activity as assigned, lead field deployments at the Senior level.

Mentor and guide Digital Forensics Technicians in tools, methodology, documentation standards, and professional conduct.

Contribute to the development and refinement of standard operating procedures, forensic protocols, training materials, and quality control processes.

Stay current on operating systems, forensic tools, mobile ecosystems, cloud platforms, legal precedents, and evolving investigative techniques through structured training and independent study.

Core Performance Domains

Domain Primary Focus Examples
Evidence Handling Preservation, documentation, intake, imaging, and validation Chain of custody, hashing, evidence logs, write-blocker setup, workstation preparation
Forensic Analysis Artifact review and issue-oriented examination User activity, USB/external device usage, mobile app data, cloud sync, timeline correlation
Reporting Clear written work product and supporting exhibits Examiner notes, client summaries, formal court-ready reports, export sets, white papers
Investigative Support Case strategy, research, and stakeholder collaboration Issue spotting, SOP development, How-To documentation, quality review, follow-up analysis
Operations Lab readiness and professional development Tool updates, kit maintenance, SOP compliance, quality control, structured training

Required Qualifications

Associate’s or Bachelor’s degree in Digital Forensics, Cybersecurity, Information Technology, Computer Science, or a related field; equivalent technical experience may be considered.

Working knowledge of Windows, macOS, iOS, and Android operating systems, file systems, user profiles, and common digital evidence sources.

Demonstrated ability to document findings carefully and communicate technical concepts clearly in writing.

Strong analytical, organizational, and problem-solving skills with superior attention to detail.

Ability to work independently, manage case tasks, and follow direction in a high-trust, confidential environment.

Professional appearance and demeanor; ability to interface with clients, attorneys, and law enforcement with confidence.

Reliable transportation; willingness to travel regionally across Oklahoma, Arkansas, and Texas.

Ability to lift and transport equipment weighing up to 50 pounds.

Must pass background checks, drug screening, and maintain ongoing compliance with company security policies.

Preferred Qualifications

1–3 years of hands-on digital forensics, cyber investigation, eDiscovery, incident response, or closely related technical experience.

MUST HAVE — Training and direct experience with one or more platforms: Cellebrite, Magnet AXIOM, FTK, EnCase, Tableau, MetaSpike, or Intella.

MUST HAVE OR PURSUING — Relevant certifications: Cellebrite CCO/CCPA/CCME, Magnet MCFE, EnCE, CFCE, GCFE, GCFA, or comparable credentials.

MUST HAVE — Demonstrated experience with report writing timeline analysis, artifact interpretation, and evidence presentation.

Exposure to field collections, business email compromise, insider threat, data theft, mobile device forensics, or cloud evidence review.

Experience authoring or contributing to white papers, SOP documentation, How-To guides, or forensic checklists.

Comfort conducting independent technical research and converting findings into repeatable investigative workflows.

Prior experience in law enforcement, military intelligence, legal support, or corporate security investigations.

Additional Requirements & Professional Development

Willingness to participate in structured onboarding, hands-on mentoring, independent study, and tool-specific training consistent with Guardian Forensics standards.

Ability to conduct independent technical research and convert findings into practical investigative methods, checklists, or SOP improvements.

Commitment to maintaining confidentiality, objectivity, defensible methodology, chain-of-custody integrity, and professional ethics at all times.

Must be able to have flexibility to work outside standard hours during active digital forensics investigations, incident response engagements or time-sensitive investigations.

Demonstrated interest in long-term growth within Guardian Forensics, with potential advancement toward Specialist, Senior Analyst, Examiner, and Investigator roles as proficiency increases.

Benefits & Opportunities

401(k) with Company Match

Company-matched retirement plan contributions, subject to company policy.

Paid Time Off

Accrued PTO plus paid holidays.

Performance Bonuses

Merit-based bonuses tied to case outcomes, certifications earned, and contributions to business development.

Wellness Membership

Gym/pool membership

Professional Development

Sponsored access to certifications, forensic tool training, workshops, and industry conferences.

Career Advancement

Defined path: Junior Analyst → Intermediate → Senior Analyst → Specialist → Investigator / Principal Consultant.

Application Process

Interested candidates should submit a resume, curriculum vitae (CV), and a brief cover letter describing their qualifications, technical background, and interest in digital forensics to: Alvey Matlock: Alvey@guardian-forensics.com.

Priority Consideration: Candidates who submit a 2–4 minute introduction video describing themselves and their experience in the DFIR field will be given priority in the interview process.

About Guardian Forensics

Guardian Forensics provides digital forensics and cybersecurity consulting services involving mobile devices, computers, servers, cloud environments, expert testimony, litigation support, incident response, insider threat analysis, intellectual property and trade secret matters, and white-collar or private investigations. The company supports law firms, corporations, financial institutions, individuals, and law enforcement agencies through legally defensible and repeatable forensic processes designed to withstand scrutiny in court and regulatory proceedings.

Similar Roles

Digital Forensics Technician

Digital Forensics & Incident Response Assistant