NCAE Mapping Hub
T447A

Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion or other crimes.

Work roles that include this task