1. Strong working knowledge of any of the following e-discovery processing tools: Nuix, LAW PreDiscovery, eCapture, Discovery Cracker, Trident, Aid4Mail and dtSearch.
2. Solid understanding of Windows operating systems, Windows applications, and common PC hardware.
3. Understanding of Macintosh operating systems, Macintosh applications, general network architecture, and common server hardware.
4. At least 2 years of experience in electronic discovery.
5. Working knowledge of current electronic discovery, data collection, storage, and chain of custody best practices.
6. Excellent reporting skills (both written and verbal).
The following, while not required, would be strong bonuses:
1. Prior experience working in a litigation support practice (e.g., internal corporate, law firm, e-discovery vendor) or preparing declarations or evidence for litigation.
2. Knowledge of review platforms such as Concordance, Summation, RingTail, Relativity, and iConect.
3. Knowledge of non-Windows/Macintosh operating systems (e.g., Linux) and email systems.
4. Knowledge of data collection tools such as FTK Imager, Robocopy, Helix, and Evidence Mover.
5. Working knowledge of forensics tools such as Encase, FTK, and Sleuthkit Prior training/working knowledge of cell phone/ PDA forensic tools (e.g. Paraben Device Seizure, Guidance Neutrino, BitPim, Cellebrite).
6. Industry qualifications such as CISSP, EnCE, ACE, CFE, MCSE, or CCE.
7. Knowledge of open-source collection, file repair, and analysis tools.
8. Experience with scripting (e.g. Perl, Enscript, Bash, and/or PowerShell) and/ or coding.
9. Experience working in a data-regulated industry (e.g. HIPAA, breach notification laws, PCI, SOX).