check Identify and stop the active breach.
check Investigate the incident and system vulnerabilities.
check Document timely response and due diligence efforts.
check Protect company from future attacks.
check Investigate whether your sensitive data has been exposed
check Detect how your network was breached
check Collect the evidence needed to fight back
check Assist in responding to ongoing threats
check Recommend changes to security procedures
check Prevent future attacks on your network
check OSForensics Examiner
check EnCase
check Cellebrite
check Certified Forensic Examiners
check Certified Ethical Hackers
check Image Processing