capabilities statement



Similar documents
Bellevue University Cybersecurity Programs & Courses

Connecting PTE to Careers in Idaho

Introduction to Cyber Security / Information Security

CompTIA Security+ (Exam SY0-410)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Security + Certification (ITSY 1076) Syllabus

Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. Xact Data Discovery. ediscovery for DUMMIES LAWYERS. MDLA TTS August 23, 2013

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

LINUX / INFORMATION SECURITY

Security Forensics Training

AccessData Corporation. No More Load Files. Integrating AD ediscovery and Summation to Eliminate Moving Data Between Litigation Support Products

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

INFORMATION SECURITY TRAINING CATALOG (2015)

Microsoft Technologies

EC-Council. Certified Ethical Hacker. Program Brochure

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

(Instructor-led; 3 Days)

Information Technology Cluster

Cloud Courses Description

Director, Value Engineering

INCIDENT RESPONSE CHECKLIST

How To Be A Computer Forensics Examiner

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

EC Council Certified Ethical Hacker V8

Page 1 of 5 Position Code #P Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

Australian Computer Society ANZSCO ICT Code descriptions v Further updates will be issued in

Domain 1 The Process of Auditing Information Systems

SourceFireNext-Generation IPS

SENIOR SYSTEMS ANALYST

Critical Controls for Cyber Security.

External Supplier Control Requirements

Protecting Your Organisation from Targeted Cyber Intrusion

Cloud Courses Description

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

IT Application Support Engineer (Database, Web & User)

IT Networking and Security

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Infrastructure Engineer

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

A Systems Engineering Approach to Developing Cyber Security Professionals

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Proactive Data Management for ediscovery

CEH Version8 Course Outline

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Bachelor of Information Technology (Network Security)

Enterprise Computing Solutions

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

NightOwlDiscovery. EnCase Enterprise/ ediscovery Strategic Consulting Services

DTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:

Field of Study Area of Expertise Certification Vendor Course

PCISS-1. Job Description: Key Responsibilities: I. Perform troubleshooting& support:

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

e-discovery Forensics Incident Response

[CEH]: Ethical Hacking and Countermeasures

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Application Intrusion Detection

A Modern Approach for Corporations Facing the Demands of Litigation

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Certified Cyber Security Analyst VS-1160

Reduce Cost and Risk during Discovery E-DISCOVERY GLOSSARY

Portable. Harvester 4.0 has Arrived!! POWERFUL E-DISCOVERY COLLECTION SOFTWARE SEARCH AND COLLECT DISCOVERABLE DOCUMENTS AND HARVESTER FEATURES

Best Practices: Defensibly Collecting, Reviewing, and Producing

Study Plan for the Bachelor Degree in Computer Information Systems

Skillsoft Course Directory January 2014

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Securing the Service Desk in the Cloud

Terms of Reference 10 ICT Technicians (Local ICT Technicians)

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Autonomy Consolidated Archive

Information and Communications Technology Courses at a Glance

information security and its Describe what drives the need for information security.

BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

Application Security Testing Powered by HPE Fortify on Demand. Managed application security testing available on demand

Jort Kollerie SonicWALL

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

E- Discovery in Criminal Law

Ovation Security Center Data Sheet

CYBER SECURITY TRAINING SAFE AND SECURE

Discovery Data Management

Transcription:

capabilities statement GSA Schedule 70 Contract Holder: Contract #: GS-35F-0649Y Duns#: 824940121 Cage Code#: 6B5K3 SIN Codes: 132-34 Maintenance of Software 132-51 Information Technology Professional Services Related Services: Cyber Security Digital Forensics Electronic Discovery Litigation Support Document Review Trial Technology Information Governance Information Technology NAICS Codes: 511210 - Software Publishers 541511 - Custom Computer Programming Services 541512 - Computer Systems Design Services 541513 - Computer Facilities Management Services 541519 - Other Computer Related Services 541611 - Administrative Management & General Management Consulting Services 541612 - Human Resource Consulting Services 611420 - Computer Training 611430 - Professional & Management Development Training VETERAN-OWNED SMALL BUSINESS Contract Holder Contract GS-35F-0649Y Contact: 220 S. Pacific Coast Highway, Suite 110 Redondo Beach, CA 90277 Office: 310-374-1100 Fax: 310-374-1101 www.lts-inc.com

Cyber Security CISSP Triage Assessment Vulnerability Mitigation Threat Containment / Vector Analysis Exploit Methodology Incident Response Data Loss Prevention Security Architecture, Implementation Risk / Threat Analysis DMZ Design Packet Analysis Signals Analysis Cryptanalysis Ethical Hacking Session Hijacking Cryptography Packet Sniffing DOS - Denial Of Service Attack SQL Injection Penetration Testing Firewall Systems Reverse Engineering Biometrics Vulnerability Exploitation Intrusion Detection & Prevention Information Security Architecture & Design Access Control Business Continuity Planning (BCP) & Disaster Recover Planning (DRP) IDS, Firewall, Honeypot Evasion Digital Forensics Preserve and analyze data from electronic data sources, including laptop and desktop computers, servers, and mobile devices. Secure digital evidence in accordance chain of custody protocols. Create forensic laboratories and evidence rooms. Utilize write-blocking technologies. Collect electronic evidence in a repeatable and defensible manner while avoiding spoliation and adhering to chain of custody protocols. Perform evidence acquisition and forensic analysis. Decryption of passwordprotected and encrypted files. Use of write blocking hardware and software. MD5 Hashing. Volatility memory analysis. Network packet / malware analysis. Document and report investigative findings. Prepare affidavits and provide expert witness testimony in depositions, declarations and at trial. Demonstrate conscientious efforts to withstand data integrity challenges from opposing counsel.

E-Discovery & Litigation Support Legal Hold Administration Data Processing & Production Database Creation Document Review Project Management & Consultation Trial Technology Support Implement, administer, and maintain Legal Hold applications in an effort to streamline the notification process Author, publish, and distribute interview questionnaires Manage and track interview questionnaire responses Create and manage preservation, collection, and exceptions reports Create data maps Adhere to Chain of Custody protocols Map data stores, perform chain of custody reporting, and manage end-to-end workflow tracking and auditing Import/export data into processing engines using a variety of software tools Perform data minimization to achieve relevant and proportional search results Create custom software programs and scripts to achieve greater functionality and precision Troubleshoot and manipulate raw, unstructured data using SQL, PERL, VB, XML, etc. Perform: OCR Data Culling Data Filtering Data Scrubbing De-Duping Near-Duping De-Nisting Design, upgrade, maintain, and host review databases Assign permissions, privileges, and necessary access rights Boolean Concept Clustering Linear Binary Bayesian Predictive Coding T.A.R. (Technology Assisted Review) Compress, index, and tune databases for optimal efficiency and performance Provide training on various forms of litigation support databases and document repositories Perform quality control review for responsiveness, relevancy, and privilege Backup, archive, cluster, and restore databases Consult with attorneys and case teams regarding best practices within established policies and procedures Manage vendor relationships and serve as primary liaison for all E-Discovery matters relating to case load Advise on EDRM and FRCP 30b(6), 26(f), 34(a), etc. Perform Early Case Assessment Attention to preservation and spoliation Implement repeatable/defensible processes Perform Expert Witness testimony Provide technology training Design and prepare the presentation of evidence such as timelines and audio/video demonstrations at trial Consult with litigation teams on the effective application of trial communication methods and multimedia equipment Provide hot seat technical assistance at trial Create, edit and support trial presentations, graphics, illustrations and other various forms of media EDRM Electronic Discovery Reference Model Processing Information Management Identification Preservation Collection Analysis Review Production Presentation

Information Governance & Records Management Maintain regulatory compliance policies and procedures Implementation of MDM (Master Data Management) Systems Adherence to (SOA) Service Oriented Architecture Maintain quality of data and ensure ROI of data Implementation of information flow policies Data definition design and creation Creation, implementation, and enforcement of risk controls Securitization, prioritization, and privatization of corporate data Data access management system design Create executive decision-making policies Information Governance Reference Model (IGRM) Linking duty + value to information asset = efficient, effective management Duty: Legal obligation for specific information Value: Utility or business purpose of specific information Asset: Specific container of information

Information Technology Network Infrastructure Skills: Cloud Computing Virtualization VOIP Storage Security Monitoring Network Architecture MCSE MCDBA CISSP CCNA, CCNP CSE - HP OpenVMS ASE - HP BladeSystem Select Technologies: AVAYA CISCO EMC HP IBM Microsoft Juniper UNIX Application Skills: Application Development Business Analysis CRM Data Governance ERP Middleware QA Select Technologies: C#, C++ Java, J2EE, Javascript.NET, ASP,.NET, VB,.NET Web 2.0 Oracle, PL/SQL TestLink Team Foundation Server Rational HTML, CSS, XML AJAX, Python, PHP Perl IT Support Skills: Help Desk Desktop Support Hardware Deployment, IMAC (Installations, Moves, Adds, Changes) Asset Inventory & Reconciliation Software Deployment IT Training & Technical Writing CompTIA: A+ Network + Security + Select Technologies: MS Windows MS Outlook Heat, Remedy, Track-It!, Support Magic Ghost, Altiris, WSUS VPN

220 S. Pacific Coast Highway, Suite 110 Redondo Beach, CA 90277 Office: 310-374-1100 Fax: 310-374-1101 www.lts-inc.com