Competencies: Security > Forensics & Incident Response

Forensics & Incident Response

Body of Knowledge

Topic Description Relevance Career Tracks

Incident Response Process

IR lifecycle (preparation, identification, containment, eradication, recovery, lessons learned), NIST 800-61, playbooks.

Critical

Incident Responder, SOC Analyst, Security Engineer

IR Planning

IR plan development, team roles (IRT), communication plans, escalation procedures, external contacts, tabletop exercises.

High

Security Manager, Incident Responder

Containment Strategies

Short-term vs long-term containment, network isolation, endpoint isolation, evidence preservation during containment.

Critical

Incident Responder, SOC Analyst

Evidence Collection

Chain of custody, volatile data capture, disk imaging, memory acquisition, network capture, cloud evidence, legal hold.

Critical

Forensics Analyst, Incident Responder

Disk Forensics

Forensic imaging (dd, FTK Imager), file system analysis, deleted file recovery, timeline analysis, Autopsy, EnCase.

High

Forensics Analyst

Memory Forensics

Volatility framework, process analysis, network connections, malware artifacts, rootkit detection, RAM acquisition.

High

Forensics Analyst, Malware Analyst

Network Forensics

Packet capture analysis, flow analysis, proxy logs, firewall logs, DNS logs, lateral movement detection.

High

Forensics Analyst, SOC Analyst

Log Analysis for IR

Timeline correlation, log aggregation, attack reconstruction, pivot points, IOC extraction from logs.

Critical

Incident Responder, SOC Analyst

Malware Analysis (Basic)

Static analysis, dynamic analysis (sandboxing), behavioral indicators, YARA rules, VirusTotal, Any.Run.

High

Malware Analyst, Forensics Analyst

Root Cause Analysis

5 Whys, fishbone diagrams, timeline reconstruction, attack chain mapping, lessons learned documentation.

High

Incident Responder, Security Manager

Post-Incident Activities

Post-mortem reports, remediation tracking, control improvements, metrics, executive briefings.

High

Incident Responder, Security Manager

Personal Status

Topic Level Evidence Active Projects Gaps

Incident Response

Advanced

CHLA incident handling — ISE authentication failures, switch misconfigurations, certificate expiration events; documented RCA methodology (STD-010)

STD-010: Root Cause Analysis Standard, Case Studies & Change Control

No forensic imaging, no memory analysis, no malware reverse engineering