We provide IT Staff Augmentation Services!

Computer Forensic Examiner Resume Profile

4.00/5 (Submit Your Rating)

Boston, MA

SUMMARY

Over eight years of computer forensic and e-discovery experience. Extensive domestic and international computer forensic and e-discovery experience managing digital forensic exams from intake to production. Recognized as an expert witness in the area of forensic analysis and digital evidence collections in multiple federal and state jurisdictions.

EXPERIENCE

Confidential

Computer Forensic Examiner

  • Conduct digital forensic acquisitions and analyses on thousands of laptops, desktops, servers, and cell phones in civil litigations, criminal matters, internal investigations, and incident response efforts.
  • Extensive experience with forensic analysis and data harvesting from Windows and Mac OS.
  • Developed acquisition, analysis and e-discovery harvesting guidelines for Macintosh computers.
  • Conduct domestic and international onsite collections and analysis of electronic media.
  • Assist in the management of day to day lab operations and assist and mentor junior examiners.
  • Conduct forensic examinations at the enterprise level with Encase Enterprise Edition and F-Response.
  • Testified twice as a computer forensic expert in Fairfax District Court, Fairfax, VA.

Significant cases include:

  • Conducted an e-discovery investigation in France of a multi-national firm involving possible violations of the Foreign Corrupt Practices Act FCPA in accordance with French privacy laws. Developed analysis protocol in coordination with French bailiff, US counsel and French local counsel.
  • Provided data analysis in Switzerland involving over 400 data custodians and ten terabytes of data in a Justice Department investigation of a multi-national bank related to American tax evaders. Conducted searches on millions of email messages and data files and produced hundreds of deliverables over the course of a yearlong investigation. Managed on-site day to day operations in Switzerland and acted as a representative in daily coordination meetings with law firms, a document production company and the client.
  • Provided data analysis in Luxembourg involving over 150 data custodians and 4 terabytes of data in an investigation of a multi-national bank related to due diligence in possible fraudulent trading activities. Conducted searches on millions of email messages and data files and produced hundreds of deliverables over the course of the investigation. Coordinated data collection, analysis and production.
  • Conducted an analysis of over thirty computers and devices of a fortune 1000 company related to a civil complaint in which numerous employees were accused of conspiring to steal intellectual property. Identified evidence that was successfully used in obtaining a temporary restraining order. Authored multiple affidavits and provided testimony in an evidentiary hearing, deposition and trial.
  • Conducted massive search for Personally Identifiable Information PII for a large bank in which an entire email server was breached. The search involved hundreds of data custodians and millions of email messages and files.
  • Conducted analysis of data theft involving armed offenders fo rcefully entering a highly secure corporate facility in the U.K. and stealing dozens of laptop computers. Conducted subsequent search for Personally Identifiable Information PII .
Confidential

Computer Forensic Examiner - High Tech Investigative Unit

  • Responsibilities included conducting computer forensic examinations of target computers seized in federal investigations of child exploitation crimes. Additionally:
  • Assisted Assistant US Attorney's and federal agents in determining the source of child exploitation offenses committed in interstate commerce. Reviewed and analyzed electronic records, and offered technical consultation during all phases of the investigation.
  • Prepared over twenty expert computer forensic reports for use in criminal indictments, discovery and trial proceedings.
  • Searched and seized electronic media during the execution of criminal search warrants involving child exploitation crimes.
  • Participated in initiative to conduct on-scene computer forensic analysis to obtain evidence used in questioning subjects on scene.
  • Developed a working knowledge of the Federal Rules of Evidence as they apply to electronic evidence. Experience in applying the rules to an electronic investigation and litigation.
  • Testified as a computer forensic expert in Federal court in the Virgin Islands, Montana and Massachusetts.
  • Provided computer forensic training to state, local and federal law enforcement, and federal prosecutors regarding how the Internet works, tracking and finding evidence in the environment of the Internet, and other forensic issues as part of the Project Safe Childhood initiative.
  • Developed protocols for the forensic analysis of a variety of online technologies used to disseminate child pornography including Peer-to-Peer software, Newsgroups, IRC, encryption, and commercial websites.
Confidential

Computer Forensic Examiner

  • Developed processes and procedures for the forensic lab.
  • Conducted computer forensic investigations relating to civil and criminal cases including Securities and Exchange investigations and fraud.
  • Worked with clients to determine forensic needs of e-discovery production.
Confidential

Computer Forensic Examiner

Significant cases include:

  • Conducted electronic discovery project for a fortune 100 company involving over 1000 computers in response to a DOJ and SEC investigation. Maintained on-site forensics laboratory and evidence storage facility at client's offices for over a year, staffed with multiple forensic examiners and administrative staff. Conducted forensic analysis of multiple hard drives across networks using EnCase Enterprise Edition. Uncovered evidence of deliberate attempts to destroy data through the use of wiping programs.
  • Forensically restored and analyzed servers in London containing e-mail sent and received by key players involved in a highly-publicized corporate inquiry that involved foreign regulatory investigation and criminal prosecution.
  • Managed analysis and review of data for multiple computers in a political corruption investigation
Confidential

Computer Forensic Examiner

  • Six month contract as a Computer Forensic Examiner assigned to the U.S. Securities and Exchange Commission's Division of Enforcement.
  • Conducted digital forensic analyses on hundreds of laptops, desktops, and servers in the SEC's investigation of the Enron matter.
  • Conducted in depth forensic analysis of multiple hard drives for deliberate attempts to destroy data through the use of wiping programs. Analyzed, reviewed, and produced electronic data from hundreds of hard drives.
  • Produced reports and analyses of findings to counsel. Designed and implemented EnCase Field Intelligence Model to enable the SEC to accomplish network acquisitions in remote locations.
Confidential

Security Analyst, Computer Forensic Examiner

  • Tested and implemented EnCase Enterprise Edition EEE on proprietary network.
  • Conducted digital forensic acquisitions and analyses on laptops, desktops, and servers regarding internal investigations and computer incident response efforts.
  • Conducted forensic examinations at the enterprise level using Encase Enterprise Edition.
  • Developed forensic acquisition and analysis protocols.
  • Provided forensic guidance to Human Resources and Corporate Legal departments regarding electronic investigations.

We'd love your feedback!