Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
Core KSAT for the following Work Roles
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Additional KSAT for the following Work Roles
No Work Roles with Additional KSAT 1030