Post Job Free
Sign in

Security Consultant Engineer

Location:
Odenton, MD
Posted:
September 10, 2022

Contact this candidate

Resume:

Kenneth Jenkins

Odenton, MD *****

adsinz@r.postjobfree.com

704-***-****

** ***** ** *** ******** Security Agency (NSA) as a Cryptographic Engineer and a subject matter expert for Key Management; developed software support libraries for solving cryptographic issues in encryption, authentication, and key exchange to include areas in Quantum resistance for protecting Government information; provided security design guidance in confidentiality and authentication to Government contractors in the development of high assurance key management products. Work Experience

Security Consultant

Benchmark Electronics - Tempe, AZ

August 2021 to Present

1. Wrote a complete set of security requirements for the development of an ultrawideband cryptographic radio; the requirements were written to guide engineers in building a trusted solution that can protect Government’s sensitive to classified information; depending on design choice, the requirements can be tailored to satisfy three major high assurance solutions for an ultrawideband cryptographic radio: the National Security Agency’s (NSA) certified Type 1, the Cryptographic High Value Product, and the Commercial Solutions for Classified.

2. Provided a 14-page security requirements compliance matrix to engineers and management for the design of a layer 3 capable network switch; a switch that will be configured for a locomotive as a Line Replacement Unit (LRU); the compliance matrix was developed to at least meet the International Electrotechnical Commission (IEC) Cyber Security requirements for the data protection of both network layers 2 and 3.

Cryptographic Engineer

National Security Agency

June 2010 to March 2020

1. Designed and delivered a signature generation program that uses a Quantum resistant algorithm; the program was developed to demonstrate the processing performance and capabilities on a Windows 7 platform; to prove that current technology can support future and more complex algorithms; saving the Government millions in system upgrades.

2. Developed and delivered the Secure Encrypt application that provides a secure key distribution path between NSA’s legacy key generation system and the modern key management infrastructure; the application eliminated future upgrade cost to the Government’s modern key management system in supporting legacy requirements.

3. Designed and delivered the Physical Electronic Transition 3 (PET3) application to the military services to help maintain their physical key distribution requirement during NSA’s transitional phase; PET3 provided the conversion capability needed to maintain their physical key requirement, saving the Government millions of dollars from an immediate system upgrade. 4. Designed and delivered the Local Key Generation Rule application that provides U.S. military services and Government communities the capability to generate key real-time during critical missions using the Key Management Infrastructure (KMI).

5. Developed the standard key specifications for NSA’s central key generation process; the standard key specifications helped reduce key generation and distribution time from 1 year to 3 months; improving the overall security capabilities for the military and Government services. Key Management Expert

National Security Agency

June 1995 to March 2020

1. Played a major part in the development and certification of the Secure Data Transfer Device 2000 System (SDS) and the Simple Key Loader (SKL); currently the most secure key loaders in the military and Government inventory.

2. Led the Key Management organization within the Agency in securing the last mile key fill operations at the crypto equipment using cryptographic techniques, improving the Government and military services’ overall security posture of their key management process. 3. Evaluated Key Management Plans sent from the U.S. military and Government support contractors with a completion time of 20 days or less to include key management security guidance and/or approval. 4. Helped develop the Key Management Plan evaluation criteria to improve NSA’s key management evaluation process; the criteria were designed to reduce confusion and improve consistency during the evaluation process for new evaluation members.

5. Provided annual training to NSA’s product support organization on the requirements and capabilities of local key generation, secure key distribution, and manual key fills with high assurance cryptographic equipment; the training improved the knowledge base of key management evaluators within NSA. Education

Master's in Electrical Engineering

Johns Hopkins University

September 1993 to June 1995

Bachelor's in Electrical Engineering

Drexel University - Philadelphia, PA

September 1985 to June 1989

Skills

• Visual Studio (Latest 2015) (10+ years)

• x86 Assembly Language Programming (Inline) (10+ years)

• Microsoft Office (10+ years)

• Programming C and C++ (10+ years)

• Knowledge of JAVA and C# (Less than 1 year)

• Circuit Analysis in linear and nonlinear hardware designs (4 years) Certifications and Licenses

Cryptographic Engineer

February 2000 to Present

Complete working knowledge in the use and implementation of cryptographic algorithms to include Quantum resistance in the areas of confidentiality, authentication, and key generation using nonlinear functions, prime numbers and key exchange techniques for the Government's high assurance products and key management systems.



Contact this candidate