capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional Services Related Services: Cyber Security Digital Forensics Electronic Discovery Litigation Support Document Review Trial Technology Information Governance Information Technology NAICS Codes: 511210 - Software Publishers 541511 - Custom Computer Programming Services 541512 - Computer Systems Design Services 541513 - Computer Facilities Management Services 541519 - Other Computer Related Services 541611 - Administrative Management & General Management Consulting Services 541612 - Human Resource Consulting Services 611420 - Computer Training 611430 - Professional & Management Development Training VETERAN-OWNED SMALL BUSINESS Contract Holder Contract GS-35F-0649Y Contact: 220 S. Pacific Coast Highway, Suite 110 Redondo Beach, CA 90277 Office: 310-374-1100 Fax: 310-374-1101 www.lts-inc.com
Cyber Security CISSP Triage Assessment Vulnerability Mitigation Threat Containment / Vector Analysis Exploit Methodology Incident Response Data Loss Prevention Security Architecture, Implementation Risk / Threat Analysis DMZ Design Packet Analysis Signals Analysis Cryptanalysis Ethical Hacking Session Hijacking Cryptography Packet Sniffing DOS - Denial Of Service Attack SQL Injection Penetration Testing Firewall Systems Reverse Engineering Biometrics Vulnerability Exploitation Intrusion Detection & Prevention Information Security Architecture & Design Access Control Business Continuity Planning (BCP) & Disaster Recover Planning (DRP) IDS, Firewall, Honeypot Evasion Digital Forensics Preserve and analyze data from electronic data sources, including laptop and desktop computers, servers, and mobile devices. Secure digital evidence in accordance chain of custody protocols. Create forensic laboratories and evidence rooms. Utilize write-blocking technologies. Collect electronic evidence in a repeatable and defensible manner while avoiding spoliation and adhering to chain of custody protocols. Perform evidence acquisition and forensic analysis. Decryption of passwordprotected and encrypted files. Use of write blocking hardware and software. MD5 Hashing. Volatility memory analysis. Network packet / malware analysis. Document and report investigative findings. Prepare affidavits and provide expert witness testimony in depositions, declarations and at trial. Demonstrate conscientious efforts to withstand data integrity challenges from opposing counsel.
E-Discovery & Litigation Support Legal Hold Administration Data Processing & Production Database Creation Document Review Project Management & Consultation Trial Technology Support Implement, administer, and maintain Legal Hold applications in an effort to streamline the notification process Author, publish, and distribute interview questionnaires Manage and track interview questionnaire responses Create and manage preservation, collection, and exceptions reports Create data maps Adhere to Chain of Custody protocols Map data stores, perform chain of custody reporting, and manage end-to-end workflow tracking and auditing Import/export data into processing engines using a variety of software tools Perform data minimization to achieve relevant and proportional search results Create custom software programs and scripts to achieve greater functionality and precision Troubleshoot and manipulate raw, unstructured data using SQL, PERL, VB, XML, etc. Perform: OCR Data Culling Data Filtering Data Scrubbing De-Duping Near-Duping De-Nisting Design, upgrade, maintain, and host review databases Assign permissions, privileges, and necessary access rights Boolean Concept Clustering Linear Binary Bayesian Predictive Coding T.A.R. (Technology Assisted Review) Compress, index, and tune databases for optimal efficiency and performance Provide training on various forms of litigation support databases and document repositories Perform quality control review for responsiveness, relevancy, and privilege Backup, archive, cluster, and restore databases Consult with attorneys and case teams regarding best practices within established policies and procedures Manage vendor relationships and serve as primary liaison for all E-Discovery matters relating to case load Advise on EDRM and FRCP 30b(6), 26(f), 34(a), etc. Perform Early Case Assessment Attention to preservation and spoliation Implement repeatable/defensible processes Perform Expert Witness testimony Provide technology training Design and prepare the presentation of evidence such as timelines and audio/video demonstrations at trial Consult with litigation teams on the effective application of trial communication methods and multimedia equipment Provide hot seat technical assistance at trial Create, edit and support trial presentations, graphics, illustrations and other various forms of media EDRM Electronic Discovery Reference Model Processing Information Management Identification Preservation Collection Analysis Review Production Presentation
Information Governance & Records Management Maintain regulatory compliance policies and procedures Implementation of MDM (Master Data Management) Systems Adherence to (SOA) Service Oriented Architecture Maintain quality of data and ensure ROI of data Implementation of information flow policies Data definition design and creation Creation, implementation, and enforcement of risk controls Securitization, prioritization, and privatization of corporate data Data access management system design Create executive decision-making policies Information Governance Reference Model (IGRM) Linking duty + value to information asset = efficient, effective management Duty: Legal obligation for specific information Value: Utility or business purpose of specific information Asset: Specific container of information
Information Technology Network Infrastructure Skills: Cloud Computing Virtualization VOIP Storage Security Monitoring Network Architecture MCSE MCDBA CISSP CCNA, CCNP CSE - HP OpenVMS ASE - HP BladeSystem Select Technologies: AVAYA CISCO EMC HP IBM Microsoft Juniper UNIX Application Skills: Application Development Business Analysis CRM Data Governance ERP Middleware QA Select Technologies: C#, C++ Java, J2EE, Javascript.NET, ASP,.NET, VB,.NET Web 2.0 Oracle, PL/SQL TestLink Team Foundation Server Rational HTML, CSS, XML AJAX, Python, PHP Perl IT Support Skills: Help Desk Desktop Support Hardware Deployment, IMAC (Installations, Moves, Adds, Changes) Asset Inventory & Reconciliation Software Deployment IT Training & Technical Writing CompTIA: A+ Network + Security + Select Technologies: MS Windows MS Outlook Heat, Remedy, Track-It!, Support Magic Ghost, Altiris, WSUS VPN
220 S. Pacific Coast Highway, Suite 110 Redondo Beach, CA 90277 Office: 310-374-1100 Fax: 310-374-1101 www.lts-inc.com