GCFA
GIAC Certified Forensic Analyst
Advanced host forensics, memory analysis, timeline reconstruction.
› Quality score
Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.
› Market signals
public, citable inputs to the recognition score› Built for these roles
› Exam format
Open-book MCQ exam, 82 questions over 3 hours plus a 15-min Cyber Live hands-on component, online proctored.
$999 retake. 30-day wait. SANS course bundle typically includes 2 attempts.
› Recertification
36 CPE credits over four years (avg 9/yr) plus the $499 renewal fee per cycle.
› NICE Framework work roles
The NIST NICE work-role IDs this cert maps to. NICCS lookup.
› Core domains covered
The 2 domains this cert is centrally about. Passing the exam demonstrates working knowledge of each.
› Prerequisites
Two-plus years of DFIR experience. Usually paired with SANS FOR508.
- Memory analysis (Volatility, Rekall)
- Timeline analysis (Plaso / log2timeline)
- Windows forensic artifacts
› Progression
requiredrecommendedWhere this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.
No vendor-gated prereqs.
› Study materials
Curated starting points. Not exhaustive — vet each against your learning style and the current exam version.
- SANS FOR508 Course Materials — SANS
- GIAC Practice Tests (2 included with exam)
› Version & lifecycle
› Salary signal
DFIR analyst / forensic examiner, US, 5+ years.
Robert Half Salary Guide + Glassdoor 'Forensic Analyst' aggregations · 2024 · US base only · p25–p75 range
› How it compares
GCFA is post-incident forensic analysis; GCIH is live incident response. Often paired.
↔ Compare side-by-side› Careers that commonly pursue this cert
Investigate breaches, contain threats, and perform digital forensics. The first call when an attack is discovered.
Dissect malicious software to understand capabilities, extract indicators, and produce attribution. A specialist role that powers threat intelligence, detection engineering, and advanced IR.
See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.