Computer Forensic Analyst
Current- Execute post-intrusion analysis of digital/electronic media to identify who, what, when, where and how the intrusion transpired- Provide technical reports following post-intrusion analysis - Perform analytical analysis, focused on datasets such as computer operating system logs, pen trap and trace data, firewall logs and server logs using network theory.