IN-FOR-001 Law Enforcement /CounterIntelligence Forensics Analyst
Investigates cybersecurity events or crimes related to information technology (IT) systems, networks, and digital evidence.
Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.
Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Knowledges 42
Code | Description | Work Roles |
---|---|---|
K0001 | Knowledge of computer networking concepts and protocols, and network security methodologies. | 52 |
K0002 | Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). | 52 |
K0003 | Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. | 52 |
K0004 | Knowledge of cybersecurity and privacy principles. | 52 |
K0005 | Knowledge of cyber threats and vulnerabilities. | 52 |
K0006 | Knowledge of specific operational impacts of cybersecurity lapses. | 52 |
K0017 | Knowledge of concepts and practices of processing digital forensic data. | 2 |
K0021 | Knowledge of data backup and recovery. | 9 |
K0042 | Knowledge of incident response and handling methodologies. | 7 |
K0060 | Knowledge of operating systems. | 13 |
K0070 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). | 13 |
K0077 | Knowledge of server and client operating systems. | 4 |
K0078 | Knowledge of server diagnostic tools and fault identification techniques. | 2 |
K0107 | Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations. | 4 |
K0109 | Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). | 15 |
K0117 | Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). | 3 |
K0118 | Knowledge of processes for seizing and preserving digital evidence. | 3 |
K0119 | Knowledge of hacking methodologies. | 2 |
K0122 | Knowledge of investigative implications of hardware, Operating Systems, and network technologies. | 2 |
K0123 | Knowledge of legal governance related to admissibility (e.g. Rules of Evidence). | 3 |
K0125 | Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence while maintaining chain of custody. | 3 |
K0128 | Knowledge of types and collection of persistent data. | 3 |
K0131 | Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. | 3 |
K0132 | Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. | 2 |
K0133 | Knowledge of types of digital forensics data and how to recognize them. | 2 |
K0134 | Knowledge of deployable forensics. | 2 |
K0145 | Knowledge of security event correlation tools. | 2 |
K0155 | Knowledge of electronic evidence law. | 3 |
K0156 | Knowledge of legal rules of evidence and court procedure. | 3 |
K0167 | Knowledge of system administration, network, and operating system hardening techniques. | 7 |
K0168 | Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures. | 11 |
K0179 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). | 19 |
K0182 | Knowledge of data carving tools and techniques (e.g., Foremost). | 2 |
K0183 | Knowledge of reverse engineering concepts. | 2 |
K0184 | Knowledge of anti-forensics tactics, techniques, and procedures. | 2 |
K0185 | Knowledge of forensics lab design configuration and support applications (e.g., VMWare, Wireshark). | 2 |
K0186 | Knowledge of debugging procedures and tools. | 2 |
K0187 | Knowledge of file type abuse by adversaries for anomalous behavior. | 2 |
K0188 | Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro). | 2 |
K0189 | Knowledge of malware with virtual machine detection (e.g. virtual aware malware, debugger aware malware, and unpacked malware that looks for VM-related strings in your computer’s display device). | 2 |
K0305 | Knowledge of data concealment (e.g. encryption algorithms and steganography). | 1 |
K0624 | Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) | 13 |
Skills 19
Code | Description | Work Roles |
---|---|---|
S0032 | Skill in developing, testing, and implementing network infrastructure contingency and recovery plans. | 2 |
S0046 | Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). | 1 |
S0047 | Skill in preserving evidence integrity according to standard operating procedures or national standards. | 4 |
S0062 | Skill in analyzing memory dumps to extract information. | 3 |
S0065 | Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics). | 2 |
S0067 | Skill in identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files). | 2 |
S0068 | Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data. | 3 |
S0069 | Skill in setting up a forensic workstation. | 2 |
S0071 | Skill in using forensic tool suites (e.g., EnCase, Sleuthkit, FTK). | 2 |
S0073 | Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.). | 5 |
S0074 | Skill in physically disassembling PCs. | 2 |
S0075 | Skill in conducting forensic analyses in multiple operating system environments (e.g., mobile device systems). | 3 |
S0087 | Skill in deep analysis of captured malicious code (e.g., malware forensics). | 2 |
S0088 | Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump). | 3 |
S0089 | Skill in one-way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]). | 3 |
S0090 | Skill in analyzing anomalous code as malicious or benign. | 2 |
S0091 | Skill in analyzing volatile data. | 2 |
S0092 | Skill in identifying obfuscation techniques. | 2 |
S0093 | Skill in interpreting results of debugger to ascertain tactics, techniques, and procedures. | 2 |
Abilities 2
Code | Description | Work Roles |
---|---|---|
A0005 | Ability to decrypt digital data collections. | 2 |
A0175 | Ability to examine digital media on multiple operating system platforms. | 2 |
Tasks 10
Code | Description | Work Roles |
---|---|---|
T0308 | Analyze incident data for emerging trends. | 2 |
T0398 | Perform file and registry monitoring on the running system after identifying intrusion via dynamic analysis. | 2 |
T0401 | Maintain deployable cyber defense toolkit (e.g., specialized cyber defense software/hardware) to support Incident Response Team mission. | 2 |
T0403 | Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data). | 2 |
T0411 | Identify and/or develop reverse engineering tools to enhance capabilities and detect vulnerabilities. | 2 |
T0419 | Acquire and maintain a working knowledge of constitutional issues which arise in relevant laws, regulations, policies, agreements, standards, procedures, or other issuances. | 2 |
T0425 | Analyze organizational cyber policy. | 3 |
T0059 | Develop a plan to investigate alleged crime, violation, or suspicious activity utilizing computers and the Internet. | 2 |
T0096 | Establish relationships, if applicable, between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, public relations professionals). | 2 |
T0220 | Resolve conflicts in laws, regulations, policies, standards, or procedures. | 6 |