Note: The career path for those entering Cheshire Constabulary eForensics Team - Technician -> Examiner -> Investigator.
http://www.cheshire.police.uk/jobs.aspx
Role: eForensics Examiner
Role Profile
Rank/Grade: Scale 6
Line Manager: Head of eForensics
Scope
With minimum supervision, conduct static examinations into computer and digital media devices, and networks and gather evidence for offences that arise from the use of computer equipment and the internet.
Examine/Triage all computer related evidence including mobile phones, CCTV and digital hardware/evidence whilst working remotely (or at HQ) to gather and report upon evidence to the standard outlined in the Cheshire Investigators Manual of Guidance, ‘Minimum Standards’.
Consult and cooperate with officers and staff of partner criminal justice agencies in order to ensure compliance with policy and procedures.
Identify devices likely to hold electronic evidence and adhere to the ACPO guidelines for the examination of electronic evidence.
Ensure a focus on bringing offenders to justice by the identification and pursuance of procedural lines of enquiry, including forensic submissions.
Compile and submit reports, statements, and presentations of evidence in criminal proceedings, to a high standard and in a form that is readily understood by non-computer users.
Provide evidence in Magistrates’ and Crown Courts as the case officer to ensure that defendants are brought swiftly and effectively to justice and communicate effectively with legal representatives and defence experts.
Ensure compliance with all national and local criminal justice case management procedures and initiatives in order to maintain and improve standards of service.
Make accurate and timely submissions of actionable intelligence via the Force intelligence systems.
Provide presentations and hi-tech crime awareness training to colleagues and partner agencies
This post is subject to an enhanced level of vetting which must be satisfied before appointment
The post holder must be able to travel anywhere in the Force area
Not withstanding the details in this job description, the job holder may be required to undertake other duties up to a level consistent with the principal responsibilities of the job
Mentor, assist and assess new members of staff to the department.
Must be prepared to handle materials that may be offensive and distressing.
Confidentiality and trust must be maintained at all times.
The post holder may be required to work outside of office hours at weekends or bank holidays.
For the post holders level of responsibility ensure that all; arrangements, activities, equipment, supervision and staff health, welfare and training are complied with as fully detailed in the Health and Safety Policy.
It is the responsibility of all staff to promote equality, diversity and Human Rights in working practices including developing and maintaining positive working relationships, ensuring that colleagues are treated fairly, contributing to developing equality of opportunity in working practices and challenging inappropriate conduct. Staff should treat everyone with fairness and impartiality, whilst recognising differences in needs, perspectives, backgrounds and cultures.
Not withstanding the details in this job description, the job holder may be required to undertake other duties up to a level consistent with the principal responsibilities of the job.
Experience and Qualifications
Qualifications:
Educated to level 5 of the QCF in Computer Forensics OR equivalent experience (BSc degree in Forensic Computing, Computer Science or equivalent/relevant subject).
Whilst an accredited EN Certified Examiner (ENCE) is not essential it is desirable to become qualified within 12 months of appointment, and required for any further progression.
Experience:
In the investigating of crime (E)
Significant experience of interrogating / researching a broad range of computer systems and telephony
Skills and Knowledge:
Be able to identify the working components of a computer and understand the function of the component parts (E)
Knowledge of the use of the Internet and other IT/IS technology in relation to criminal offences and the methods available to trace and identify offenders (E)
Know how to trace and identify the source of activity on the Internet including the origin of e-mails, postings to a web-page (D)
Regards
Andy
↧