• Analyzing network traffic and logs
  • Investigating email headers and attachments