T738
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
Work roles that include this task
- CS-531 additional Cyber Defense Incident Responder