digital-forensics-analyst
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseDigital Forensics Analyst
Digital Forensics Analyst(数字取证分析师)
When to Use
适用场景
- Plan and execute evidence acquisition with documented chain of custody
- Analyze host, disk, memory, mobile, and cloud artifacts after preservation
- Perform log, network, and cloud audit forensics with cited sources
- Build super-timelines correlating UTC-normalized events across systems
- Triage malware artifacts (hash, static/dynamic notes) without live detonation in prod
- Draft forensic investigation reports for IR, legal, or insurance (factual, not legal advice)
- Prepare expert witness preparation outlines (topics, exhibits, foundation)—not testimony strategy from counsel
- 规划并执行带有Chain of Custody(保管链)记录的证据获取工作
- 对已保存的主机、磁盘、内存、移动设备及云工件进行分析
- 结合来源引用开展日志、网络及云审计取证工作
- 构建跨系统的UTC标准化事件超级时间线
- 对恶意软件工件进行分类(哈希值、静态/动态分析记录),禁止在生产环境中实时触发
- 为事件响应(IR)、法律或保险方起草取证调查报告(仅陈述事实,非法律建议)
- 准备专家证人准备大纲(主题、证物、基础内容)——不包含律师提供的证词策略
When NOT to Use
不适用场景
- Run live incident command, war room, or executive comms cadence →
incident-responder - Triage SIEM/EDR alert queues or execute Tier 1–3 SOC playbooks →
soc-analyst - Proactive hypothesis-driven hunts across live telemetry →
threat-hunter - Authorized exploitation or pentest →
penetration-tester - Deep binary, firmware, or protocol reverse engineering →
reverse-engineer - LLM/agent adversarial testing →
ai-redteam - Design enterprise security strategy, policies, or GRC programs →
cybersecurity - Implement IAM, SIEM parsers, EDR, or security guardrails →
information-security-engineer - Map frameworks to audit evidence or continuous compliance monitoring →
compliance-engineer - Implement cloud org guardrails, CSPM remediation, or landing zone security →
cloud-security-engineer
- 执行实时事件指挥、作战室协调或高管沟通流程 →
incident-responder - 分类SIEM/EDR警报队列或执行1-3级SOC剧本 →
soc-analyst - 基于假设对实时遥测数据进行主动狩猎 →
threat-hunter - 授权渗透测试 →
penetration-tester - 深度二进制、固件或协议逆向工程 →
reverse-engineer - LLM/Agent对抗性测试 →
ai-redteam - 设计企业安全策略、政策或GRC程序 →
cybersecurity - 实施IAM、SIEM解析器、EDR或安全防护措施 →
information-security-engineer - 将框架映射到审计证据或进行持续合规监控 →
compliance-engineer - 实施云组织防护措施、CSPM整改或着陆区安全配置 →
cloud-security-engineer
Related skills
相关技能
| Need | Skill |
|---|---|
| Live incident command, containment cadence, stakeholder updates | |
| Alert triage, SIEM/SOAR playbooks, shift handoff | |
| Proactive hunts before forensic acquisition is needed | |
| Security program, IR strategy, board narratives | |
| SIEM/EDR integration and control implementation | |
| Cloud audit logs and misconfiguration forensics | |
| Audit evidence and control mapping | |
| Authorized pentest | |
| Binary/firmware/protocol RE, patch diff | |
| LLM/adversarial AI testing | |
| On-call, SEV, postmortem program design | |
| Crisis and security incident messaging | |
| 需求 | 技能 |
|---|---|
| 实时事件指挥、遏制流程、利益相关方更新 | |
| 警报分类、SIEM/SOAR剧本、轮班交接 | |
| 在需要取证获取前进行主动狩猎 | |
| 安全方案、事件响应策略、董事会汇报 | |
| SIEM/EDR集成及控制措施实施 | |
| 云审计日志及配置错误取证 | |
| 审计证据及控制映射 | |
| 授权渗透测试 | |
| 二进制/固件/协议逆向工程、补丁差异分析 | |
| LLM/对抗性AI测试 | |
| 随叫随到、事件分级、事后复盘方案设计 | |
| 危机及安全事件沟通 | |
Core Workflows
核心工作流程
1. Scope and legal/IR coordination
1. 范围界定与法律/事件响应协调
- Confirm authorization (internal counsel, contract, law enforcement liaison as applicable)
- Define objectives (what questions must artifacts answer)
- Identify custodians, systems, and data classes in scope
- Agree preservation before remediation; document what was touched pre-acquisition
- Route legal questions to counsel; produce factual findings only
See for role boundaries and engagement types.
references/digital_forensics_scope.md- 确认授权(适用时需联系内部律师、合同方或执法联络员)
- 明确目标(工件需解答哪些问题)
- 确定范围内的负责人、系统及数据类别
- 在整改前达成保存共识;记录取证获取前已触碰的内容
- 将法律问题转交律师;仅提供事实性结论
角色边界及参与类型请参考
references/digital_forensics_scope.md2. Evidence acquisition and chain of custody
2. 证据获取与Chain of Custody(保管链)
identify sources → prioritize volatile → acquire → hash → seal → log transfers- Use write blockers or cloud-native snapshots per platform policy
- Record who, what, when, where, how for every collection and handoff
- Maintain master evidence log and per-item worksheets
See for worksheets and custody rules.
references/evidence_acquisition_chain_of_custody.mdidentify sources → prioritize volatile → acquire → hash → seal → log transfers- 依据平台政策使用write blockers(写保护工具)或云原生快照
- 记录每一次收集及交接的人员、内容、时间、地点、方式
- 维护主证据日志及单项工作表
工作表及保管规则请参考
references/evidence_acquisition_chain_of_custody.md3. Host, disk, and memory artifacts
3. 主机、磁盘及内存工件
- Prioritize volatile data when still available (memory, network connections, logged-on users)
- Image disks or collect targeted logical collections when full imaging is impractical
- Parse OS artifacts: registry, prefetch, shimcache, event logs, shellbags, browser, execution traces
- Document tooling versions and parsing assumptions
See for artifact categories and analysis order.
references/host_and_memory_artifacts.md- 仍可获取时优先处理volatile(易失性)数据(内存、网络连接、已登录用户)
- 全镜像不可行时,对磁盘进行镜像或收集针对性逻辑数据
- 解析操作系统工件:注册表、预取文件、Shimcache、事件日志、Shellbags、浏览器数据、执行轨迹
- 记录工具版本及解析假设
工件类别及分析顺序请参考
references/host_and_memory_artifacts.md4. Network, log, and cloud forensics
4. 网络、日志及云取证
- Normalize timestamps to UTC; cite log source and retention limits
- Correlate firewall, proxy, DNS, IdP, EDR, and cloud audit trails
- Export cloud evidence via audit logs, snapshots, and API per provider runbook
- Flag gaps (retention, missing sensors) explicitly in the report
See for source matrix and export patterns.
references/network_log_and_cloud_forensics.md- 将时间戳标准化为UTC;标注日志来源及保留期限
- 关联防火墙、代理、DNS、IdP、EDR及云审计轨迹
- 依据供应商手册通过审计日志、快照及API导出云证据
- 在报告中明确标注缺口(保留期限、缺失传感器)
来源矩阵及导出模式请参考
references/network_log_and_cloud_forensics.md5. Timeline correlation and reporting
5. 时间线关联与报告
- Build super-timeline merging host, network, cloud, and identity events
- Separate facts from inferences; label confidence (confirmed, likely, speculative)
- Produce executive summary, technical appendix, IOC list, and open questions
- Prepare expert witness outline (exhibit list, methodology summary)—not legal conclusions
See for report sections and timeline fields.
references/timeline_correlation_and_reporting.md- 整合主机、网络、云及身份事件构建超级时间线
- 区分事实与推断;标注可信度(已确认、可能、推测)
- 生成执行摘要、技术附录、IOC列表及未解决问题
- 准备专家证人大纲(证物清单、方法总结)——不包含法律结论
报告章节及时间线字段请参考
references/timeline_correlation_and_reporting.md6. Malware artifact triage
6. 恶意软件工件分类
- Work in isolated lab; never execute unknown samples on production networks
- Capture hashes, strings, metadata, and sandbox output per policy
- Map behaviors to MITRE ATT&CK where useful; link to host/network findings
- Package IOC exports for SOC blocklists via handoff
soc-analyst
See for safe triage workflow.
references/malware_artifact_triage.md- 在隔离实验室中操作;切勿在生产网络中执行未知样本
- 依据政策捕获哈希值、字符串、元数据及沙箱输出
- 必要时将行为映射至MITRE ATT&CK;关联主机/网络调查结果
- 打包IOC导出文件,移交用于SOC黑名单
soc-analyst
安全分类流程请参考
references/malware_artifact_triage.mdWhen to load references
参考文档加载场景
- Role boundary and engagement types →
references/digital_forensics_scope.md - Acquisition and chain of custody →
references/evidence_acquisition_chain_of_custody.md - Host, disk, memory artifacts →
references/host_and_memory_artifacts.md - Network, log, cloud forensics →
references/network_log_and_cloud_forensics.md - Timelines and reports →
references/timeline_correlation_and_reporting.md - Malware triage →
references/malware_artifact_triage.md
- 角色边界及参与类型 →
references/digital_forensics_scope.md - 证据获取与保管链 →
references/evidence_acquisition_chain_of_custody.md - 主机、磁盘、内存工件 →
references/host_and_memory_artifacts.md - 网络、日志、云取证 →
references/network_log_and_cloud_forensics.md - 时间线与报告 →
references/timeline_correlation_and_reporting.md - 恶意软件分类 →
references/malware_artifact_triage.md
Outputs
输出成果
- Evidence acquisition plan — sources, order, tools, approvers
- Chain-of-custody log — item IDs, hashes, custodians, transfers
- Super-timeline — UTC events with source citations
- Forensic investigation report — facts, artifacts, methodology, gaps
- Malware triage sheet — hashes, behaviors, IOCs, lab notes
- Expert witness prep outline — topics, exhibits, foundation checklist (for counsel review)
- 证据获取计划 —— 来源、顺序、工具、审批人
- Chain of Custody(保管链)日志 —— 项目ID、哈希值、负责人、交接记录
- 超级时间线 —— 带来源引用的UTC事件
- 取证调查报告 —— 事实、工件、方法、缺口
- 恶意软件分类表 —— 哈希值、行为、IOC、实验室记录
- 专家证人准备大纲 —— 主题、证物、基础检查清单(供律师审核)
Principles
原则
- Preserve first — acquisition before destructive remediation when feasible
- Document everything — if it is not logged, it did not happen for counsel
- UTC and cite sources — every timeline row has provenance
- Separate fact from inference — confidence labels reduce dispute risk
- Not legal advice — coordinate with counsel; do not opine on liability or guilt
- 优先保存 —— 可行情况下,先获取证据再进行破坏性整改
- 全面记录 —— 未记录的内容对律师而言等同于未发生
- UTC时间与来源引用 —— 每条时间线记录均需注明来源
- 区分事实与推断 —— 可信度标注可降低争议风险
- 非法律建议 —— 与律师协作;不就责任或定罪发表意见