intrusion artifacts (e.g., PCAP, domains, URI’s, certificates, etc.) and uses discovered data to enable mitigation of potential Computer and methodologies
Proficiency with network analysis software (e.g. Wireshark) Proficiency with carving and extracting information