Conduct complex and high profile, non destructive evaluations of target computer systems to determine operating and file systems, stored information, user and program logs, ownership, and access methodology, as well as security features and usage Provide detailed forensic examinations for NCIS cases Document artifacts and deliverables according to standardized formats and