Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 738
Additional KSAT for the following Work Roles
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.