Post Job Free

Resume

Sign in

Java Developer/Cryptography

Location:
Fairfield, IA
Posted:
October 04, 2015

Contact this candidate

Resume:

MEHARI GEBREZGI

**** ***** *** ******

Fairfield, Iowa 52557

641-***-****

acrxwa@r.postjobfree.com

www.linkedin.com/in/meharigebrezgi

JAVA DEVELOPER/Cryptography

Innovative system developer with 8 years of experience performing analysis on technical and security issues and developing cryptographic algorithms to resolve problems. Proven leader with success in managing development teams while coordinating projects. Skilled in Java/EE, C, C++, Python, Ruby, PHP, Android, Spring, Hibernate, HTML, CSS, JSON, XML, JavaScript, Apache, AJAX, jQuery, JEE programming skills(web service, SOAP, WSDL, REST). System Development

Java Web Frameworks

Software Development Life Cycle

Algorithms

Team Leadership

Cryptographic Algorithms

Analysis and Design

Security Breaking

Security Protection

Languages: Java/EE, C, C++, Python, Ruby, PHP, Android Web: HTML, CSS, JSON, XML, JavaScript, AJAX, jQuery Databases: MySQL

Web Servers/Application Servers: Tomcat, Glass-fish, Tools: NetBeans, Eclipse, Pari

Platforms: Windows (XP-Windows 8), Ubuntu (8.04-14.10) SDLC: Iterative, Waterfall (Planning, Defining, Designing, Building, Testing, Deploying) Frameworks: Spring MVC, JavaServer Pages (JSP), Servlet API, JavaServer Faces (JSF) Design Pattern: Iterator, Factory Method, Singleton, Abstract Factory PROFESSIONAL EXPERIENCE

CAREER NOTE: Completed on-campus studies and currently taking distance education courses to complete a Master's Degree in Computer Science (Available for full-time, W-2 employment).

INFORMATION NETWORK SECURITY AGENCY, Addis Ababa, Ethiopia 2007-2015

Government organization specializing in information security. Cryptographic Algorithm Design / Development Team Leader Led design and implementation of cryptographic algorithm using C programming language in Ubuntu platform. Generated elliptic curve parameters (a, b, p, G, n) using GNU Multi-Precision Library for their mathematical representation. Coordinated team of developers and established effective working environment. Strengthened security requirements for problem domain given by company.

Responsibilities

●Understand, analyze, design, and develop web based systems and associated modules using Java, development frameworks and relational databases.

●Perform software coding, testing, debugging for on-line processes in accordance with industry best practices and specific internal procedures and standards.

●Contribute to task identification, work effort estimates, and work schedules for development and maintenance activities.

●Implement new features for existing application and assist in building new applications based on customer specification, involvement in the entire software development life cycle process.

●Involved in software development, implementation, testing and production support.

●Involved in the development of security for memory constrained devices using C, Java, SQLite.

●Worked as SCRUM master to lead project development using Agile SCRUM methodology.

●Mentor peers to make them understand the requirement, technical support and Co-ordinate with the release management team to ensure that the proper process is followed during the release.

●Application Performance enhancements and insures the security requirement had been implemented properly.

●Created documents as needed for Software development life cycle and knowledge sharing for team members.

●Worked with QA Team for Quality Assurance and Test case automation of the Application.

●Led design and implementation of cryptographic algorithm using C and Java.

●Coordinated team of developers and established effective working environment.

●Strengthened security requirements for problem domain given by the company.

●Developed algorithm to streamline web-based medical consultancy by establishing medical case for patients and reporting information to doctor.

●Performed analysis on Microsoft Word 2003 files object format to initiate security break of encrypted files. Led successful break of DES algorithm, Microsoft Word 2003 RC4 algorithm and PDF 1.4 encrypted file using CrackPDF as open source. Defined integrity of cryptographic component on all files and identified application vulnerability through file integration.

●Designed tracking system using geo-spatial information system and war game. Generated information from MySQL database and provided data in ArcMap using ArcGIS system.

●Developed algorithm to represent information and draw pointer on displayed map. Elliptic curve-based cryptographic solution as opposed to RSA-based solution for Radio communication and any small devices by achieving same security strength but avoiding memory constraints of RSA solutions for these.

●Insure the security of different applications using standard encryption, decryption, and hashing, key management, certificate management, and signatures. Tools and Technologies:- Java/EE, C, C++, Spring MVC, Hibernate, Eclipse IDE, Tomcat, Ajax, XML, jQuery, Java Script, CSS, JSON, RSA, ECC, AES, DES, SHA-1 up to ShA-512, DSA. Achievements:

*Prepared and presented Proof of Concept (POC) to convince company to accept elliptic curve- based cryptographic solution as opposed to RSA-based solution that had been proposed to team by higher manager.

*Created fully tested elliptic curve parameter generator used for secured radio communications and any other memory constrained devices such as smart cards.

*Earned performance award and met project delivery expectations for school management system project which was named as one of the best MIS systems at 2013 Ethiopian ICT Exhibition organized by Ethiopian Ministry of Communication and Information Technology.

*Led development of school management information system in Spring Tool Suite IDE in coordination with Eclipse IDE using Core Java, and Hibernate framework with Tomcat web server and MySQL. Used spring core security plugin for system user management, file uploader plug in for eLibrary management system, with integration of ExtJS front end JavaScript framework.

*Drove web-based role model Management Information System for export-oriented micro/small enterprises, managed end-to-end project lifecycle in RUP, and produced technical proposal, requirements gathering and system design. Implemented using JSF, Core Java and MySQL, JDBC in Netbeans IDE with Jasper Report as report engine with JUnit testing framework.

*Recognized with Best Employee Award for 2 consecutive years. Skills Used

• Over 8 years of professional experience in designing, developing, debugging Web-based and Enterprise applications and cryptographic security solutions using JAVA/JEE technologies, Symmetric Key Cryptography, Public Key Cryptography and Certificates.

• Involved in developing distributed Enterprise and Web applications using UML, Java/J2EE, Web technologies that include JSP, Servlets, JDBC, HTML, XML, Java Script and Hibernate.

• Designed Use Case diagrams, Class diagrams, Activity diagram, Sequence diagrams, Flow Charts, and deployment diagrams using Rational Rose Tool and Microsoft Visio.

• Experience in Web application development using Java, Servlets, JSP, JSTL, Java Beans, HTML, CSS, XML, and AJAX.

• Experience with IDE’s like Eclipse, NetBeans and Jdeveloper for developing JEE/JAVA applications.

• Experience with design Patterns like MVC.

• Experience in Web Services Technologies like SOAP, WSDL, UDDI and Service Oriented Architecture (SOA).

• Experience with J2EE application server Tomcat, Glass-fish.

• Knowledge of multi-vendor operating systems including Linux, Windows and UNIX Shell Script.

• Willing to learn and adapt to new technologies

ACADEMIC PROJECTS

*Amharic Keyboard in Android: Developed keyboard based on “Amharic” language for use in Android devices. Accomplished customer-based solution for this project. Technologies used: Java in Android Environment, Eclipse IDE, XML, JSON.

*Online Appointment: Led Software Development Life Cycle for project by planning, designing, and testing .Transcendental Meditation check web-based online appointment system. Technologies used: Java, Spring MVC, JavaScript, RESTful Web Service, JSP, Servlet API, MySQL.

*Session Hijacking Protection: Developed and protected PHP-based web site for any impersonation attack with most crucial piece of information for an attacker being session identifier which can be obtained through Prediction, Capture, and Fixation. Technologies used: PHP, HTML, AJAX.

*Text Reader, Mekelle Institute of Technology: Designed desktop application while implementing

.net to read and write text for blind users. Collaborated with 2 team members to program and code sounds associated with letters.

*Thief Detector, Mekelle Institute of Technology: Created thief detector application using assembly language in micro-controller. Spearheaded comprehensive management of entire project.

EDUCATION

Master of Science in Computer Science, Maharishi University of Management, Fairfield, Iowa

(In progress via distance education courses; expected completion December 23, 2017) Key Courses: Fundamentals of Programming Practices with Core Java, Modern Programming Practices, Web Application Programming, Computer Security, Algorithms, Web Applications Architecture and Frameworks (Spring MVC, JSP), Mobile Computing (Android) Master of Technology in Computer Science and Engineering (MTech) Indian Institute of Technology Delhi (IITD), Delhi, India Bachelor of Science in Computer Science and Engineering Mekelle Institute of Technology, Mekelle, Tigrai

RESUME



Contact this candidate