An investigator must take several steps when investigating a compromised Unix system. This includes reviewing logs, searching for keywords, examining configuration and startup files, and identifying unauthorized accounts or processes. Log files like syslog provide details on activities, while searches for unusual file names or timestamps around the incident time can reveal altered files. Special attention should be given to SUID/SGID files, cron jobs, and the /tmp directory which are commonly targeted by attackers.