领域
Security
技能档案
Log analysis, timeline reconstruction, evidence collection, chain of custody, artifacts
角色数
3
包含此技能的角色
级别数
5
结构化成长路径
必要要求
15
其余 0 个可选
Security
Incident Response
2026/3/17
选择当前级别并对比期望。下方卡片显示晋升所需掌握的内容。
表格展示从初级到首席的技能深度变化。点击行查看详情。
| 角色 | 必要性 | 描述 |
|---|---|---|
| Application Security Engineer | 必要 | Understands basic Digital Forensics concepts. Follows security guidelines. Recognizes typical code vulnerabilities. |
| Penetration Testing Engineer | 必要 | Understands basic Digital Forensics concepts. Follows security guidelines. Recognizes common vulnerabilities in code. |
| Security Analyst | 必要 | Understands basic Digital Forensics concepts. Follows security guidelines. Recognizes common code vulnerabilities. |
| 角色 | 必要性 | 描述 |
|---|---|---|
| Application Security Engineer | 必要 | Applies digital forensics techniques to investigate application security incidents. Collects and preserves application logs, memory dumps, and network captures maintaining chain of custody. Uses forensic tools (Volatility, Autopsy) to analyze artifacts from compromised web applications. |
| Penetration Testing Engineer | 必要 | Uses digital forensics fundamentals to document exploitation evidence during penetration tests. Captures system artifacts, file hashes, and timeline data to support findings. Analyzes disk images and memory snapshots to identify indicators of compromise and validate attack paths. |
| Security Analyst | 必要 | Performs initial forensic triage on security alerts using log analysis and artifact collection. Preserves digital evidence following established procedures and chain of custody requirements. Uses forensic imaging tools to create verified copies of affected systems for detailed investigation. |
| 角色 | 必要性 | 描述 |
|---|---|---|
| Application Security Engineer | 必要 | Designs security solutions with Digital Forensics Basics. Conducts threat modeling. Implements security practices in SDLC. Mentors the team. |
| Penetration Testing Engineer | 必要 | Designs forensic-aware penetration testing methodologies that produce court-admissible evidence when needed. Conducts advanced memory forensics and malware analysis to reverse-engineer attack techniques. Mentors team on anti-forensic awareness and evidence preservation during red team engagements. |
| Security Analyst | 必要 | Leads complex forensic investigations across multiple systems and environments. Performs advanced timeline analysis, memory forensics, and malware reverse engineering. Integrates forensic findings into threat intelligence workflows and SIEM correlation rules. Mentors junior analysts on forensic methodologies. |
| 角色 | 必要性 | 描述 |
|---|---|---|
| Application Security Engineer | 必要 | Defines forensic readiness strategy for application security ensuring logging, monitoring, and evidence collection capabilities are built into systems by design. Establishes forensic investigation playbooks and trains teams on evidence handling procedures for application-layer incidents. |
| Penetration Testing Engineer | 必要 | Defines forensic capabilities within the offensive security practice. Establishes standards for evidence collection, preservation, and reporting during penetration tests and red team exercises. Coordinates with legal and compliance teams on forensic requirements and trains offensive security staff on forensic techniques. |
| Security Analyst | 必要 | Defines the organization's digital forensics strategy including tooling, processes, and team capabilities. Establishes forensic readiness policies ensuring systems produce investigation-quality logs and artifacts. Coordinates forensic investigations with legal counsel and law enforcement when required. |
| 角色 | 必要性 | 描述 |
|---|---|---|
| Application Security Engineer | 必要 | Shapes enterprise forensic architecture ensuring all application platforms maintain forensic readiness across cloud and on-premise environments. Drives industry standards for application-layer forensics and evidence handling. Advises executive leadership on forensic capability investments and regulatory compliance. |
| Penetration Testing Engineer | 必要 | Defines enterprise-wide offensive security forensic standards that align with legal and regulatory frameworks. Shapes the industry approach to forensic-integrated penetration testing. Advises executive leadership on forensic capabilities required for advanced threat simulation and incident preparedness. |
| Security Analyst | 必要 | Defines enterprise digital forensics strategy aligned with legal, compliance, and business continuity requirements. Shapes forensic architecture across all environments ensuring investigation readiness at scale. Represents the organization in industry forensic communities and drives adoption of advanced forensic methodologies. |