Loading...
Loading...
Guides digital forensics for security incidents—evidence acquisition and chain of custody, disk/memory/mobile/cloud artifact analysis, log and network forensics, timeline correlation, malware artifact triage, and investigation reports for legal/IR and expert-witness preparation outlines (not legal advice). Use when preserving and analyzing forensic artifacts, building super-timelines, documenting acquisition worksheets, triaging malware samples, or preparing forensic findings for counsel—not live incident command (incident-responder), SOC alert queue triage (soc-analyst), authorized penetration testing (penetration-tester), deep binary RE (reverse-engineer), LLM red team (ai-redteam), enterprise ISMS programs (information-security-engineer), audit control mapping (compliance-engineer), or cloud guardrail implementation (cloud-security-engineer).
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill digital-forensics-analystincident-respondersoc-analystthreat-hunterpenetration-testerreverse-engineerai-redteamcybersecurityinformation-security-engineercompliance-engineercloud-security-engineer| Need | Skill |
|---|---|
| Live incident command, containment cadence, stakeholder updates | |
| Alert triage, SIEM/SOAR playbooks, shift handoff | |
| Proactive hunts before forensic acquisition is needed | |
| Security program, IR strategy, board narratives | |
| SIEM/EDR integration and control implementation | |
| Cloud audit logs and misconfiguration forensics | |
| Audit evidence and control mapping | |
| Authorized pentest | |
| Binary/firmware/protocol RE, patch diff | |
| LLM/adversarial AI testing | |
| On-call, SEV, postmortem program design | |
| Crisis and security incident messaging | |
references/digital_forensics_scope.mdidentify sources → prioritize volatile → acquire → hash → seal → log transfersreferences/evidence_acquisition_chain_of_custody.mdreferences/host_and_memory_artifacts.mdreferences/network_log_and_cloud_forensics.mdreferences/timeline_correlation_and_reporting.mdsoc-analystreferences/malware_artifact_triage.mdreferences/digital_forensics_scope.mdreferences/evidence_acquisition_chain_of_custody.mdreferences/host_and_memory_artifacts.mdreferences/network_log_and_cloud_forensics.mdreferences/timeline_correlation_and_reporting.mdreferences/malware_artifact_triage.md