Profiles search
John Rowley
Data Protection Expert (Cryptography Engineer) at Huntington National Bank
Blairsville, PA, United States
Details
Experience:
As a cryptographic subject matter expert, I identify gaps in existing cryptography systems testing new cryptographic theories to meet enterprise needs. I implementing encryption and security solutions to the enterprise network. I developing encryption technology for an organization that included certificate management and key management using not only industry best practices but also industry leading tools, such as Venafi and Thales products.
I assisted in the training other team members to handle encrypted data as well as training those outside my department on the what and how of certificate and key management. I wrote policies, standards the CPS and CP as well as training materials for new team members and application owners on how to use and request certificates and encryption keys.
I did research on new cryptography techniques and cybersecurity methods for the upcoming of quantum computing and how it will affect the status quo. Keeping apprised of the latest standards and how the changing landscapes will alter how the enterprise will keep up with the updates in the NIST documentation, the EAR standard and the CSRC.
2019 : Present
Huntington National Bank
Information Security Engineer
Carried out requirements analyses, system design and development, and integration oft Public Key Infrastructure (PKI) and Public Key Enabling (PKE) initiatives for RSA and Windows OS.
Engineered systems for the bank's PKI including LDAP, Active Directory, and Web Servers.
Served as PKI engineer for PKI Certificate Authority (CA) servers.
Configured, tested and implemented Hardware Security Modules (HSM) and Data Encryption Modules (DEM). On CA and Web servers.
2014 : 2019
PNC
Cryptologic Technician
Analyze log and determine what to escalate for further review.
GREP and AWK raw log to determine if it is malicious or not.
Restarting processes on different boxes that Solutionary collects logs from.
Writing emails to the client to explaining what the threat is and how to mitigate it.
2012 : 2014
Solutionary
ISA
Network support
Fixed problems with route loops and route congestion
Maintained servers and work stations
Network Security
Firewall installation and maintenance
Anti-virus troubleshooting and testing
SQL server security baseline and hardening
Physical security
Troubleshooting security door
Security camera selection
2010 : 2011
Purchasing Service Company
Information Security Professional
Worked with Dr. Soundararajan Ezekiel on grant for Live Digital Forensics Study
Pilot study on issues and complexity of digital forensics and how digital forensics can be applied in a live environment without the loss or spoilage of valuable data and evidence
Presented formal overview of study at IEEE Johnstown Section meeting
2008 : 2010
Indiana University of Pennsylvania
Assistance to Dr. Soundararajan Ezekiel
I assisted in the training other team members to handle encrypted data as well as training those outside my department on the what and how of certificate and key management. I wrote policies, standards the CPS and CP as well as training materials for new team members and application owners on how to use and request certificates and encryption keys.
I did research on new cryptography techniques and cybersecurity methods for the upcoming of quantum computing and how it will affect the status quo. Keeping apprised of the latest standards and how the changing landscapes will alter how the enterprise will keep up with the updates in the NIST documentation, the EAR standard and the CSRC.
2019 : Present
Huntington National Bank
Information Security Engineer
Carried out requirements analyses, system design and development, and integration oft Public Key Infrastructure (PKI) and Public Key Enabling (PKE) initiatives for RSA and Windows OS.
Engineered systems for the bank's PKI including LDAP, Active Directory, and Web Servers.
Served as PKI engineer for PKI Certificate Authority (CA) servers.
Configured, tested and implemented Hardware Security Modules (HSM) and Data Encryption Modules (DEM). On CA and Web servers.
2014 : 2019
PNC
Cryptologic Technician
Analyze log and determine what to escalate for further review.
GREP and AWK raw log to determine if it is malicious or not.
Restarting processes on different boxes that Solutionary collects logs from.
Writing emails to the client to explaining what the threat is and how to mitigate it.
2012 : 2014
Solutionary
ISA
Network support
Fixed problems with route loops and route congestion
Maintained servers and work stations
Network Security
Firewall installation and maintenance
Anti-virus troubleshooting and testing
SQL server security baseline and hardening
Physical security
Troubleshooting security door
Security camera selection
2010 : 2011
Purchasing Service Company
Information Security Professional
Worked with Dr. Soundararajan Ezekiel on grant for Live Digital Forensics Study
Pilot study on issues and complexity of digital forensics and how digital forensics can be applied in a live environment without the loss or spoilage of valuable data and evidence
Presented formal overview of study at IEEE Johnstown Section meeting
2008 : 2010
Indiana University of Pennsylvania
Assistance to Dr. Soundararajan Ezekiel
Company:
Huntington National Bank
About
Carried out requirements analyses, system design and development, and integration of Public Key Infrastructure (PKI) and Public Key Enabling (PKE) initiatives for RSA and Windows OS.
Engineered systems for the bank's PKI including LDAP, Active Directory, and Web Servers.
Served as PKI engineer for PKI Certificate Authority (CA) servers.
Administer the front end for Symantec Desktop Encryption (PGP mail servers.
Maintained and updated the tracking of PII and HPI data for analysis.
Created training for certificate owners
SSH Key push to servers and rotation
Certificate compliance, and life cycle management automated through Venafi.