Security consultant with over 25 years of direct installation, configuration, and support roles; chiefly focused on endpoint and similar security controls but for the past eight years I've been a solution architect and proposal writer crafting statements of work for clients of all sizes, sectors, and verticals aligning them with the products and services to make those security goals a reality. I have relied on a very broad and varied range of experiences and opportunities, tying each together and using them to expand my experience for each and every client.
-
Technical Sales EngineerConversant Group Sep 2023 - Dec 2024Chattanooga, Tennessee, UsHands-on Technical Sales Engineer engaged in pre-sales activities to evangelize, position, and architect solutions for clients using Conversant Group’s secure-first designs and configurations of hardware, software, and services. Engaging in post-sales activities to work alongside the implementation and managed services teams to ensure successful delivery of our secure solutions to clients.• Extended product knowledge for solutions Conversant Group recommends.• Competitive knowledge for products that are not part of the Conversant Group portfolio so the customer understands the risks associated with implementing alternative solutions.• Work with sales team to propose solutions that meet the technology and business requirements for the client.• Work with sales team members to help manage, support, and prioritize sales opportunities.• Lead in the discovery, analysis, design, and refinement of fully integrated, secure technology solutions.• Host pre-sales discovery and design calls with prospects, including C-level executives.• Join post-sales technical implementation calls with clients and Conversant Group’s delivery teams.• Write technical and functional specifications to match client requirements, including statements of work (SOWs) and letters of engagement (LOEs).• Work with sales team members, as well as external vendors, to build and review bills of materials (BOMs) for solutions being designed and sold.• Work closely with PMO and Implementation teams to communicate the vision and ensure successful delivery of designed solutions to the client. -
Security ArchitectOptiv Aug 2015 - Jun 2023Denver, Colorado, UsSecurity Architect providing pre-sales support to Optiv’s clients and sales teams matching clients’ needs and expectations aligned with the products and services Optiv offers, or creating unique offerings to meet clients’ goals where a service did not previously exist. Assisting clients identify key deliveries and critical areas of concern to assure the maximum benefit from the consulting services provided, ensuring the proper level of effort and scope of work are accurately captured and detailed. -
Principal ConsultantOptiv Aug 2011 - Aug 2015Denver, Colorado, UsPrincipal Consultant in Optiv’s Centers of Excellence on the Endpoint Solutions, Architecture and Implementation team providing post-sales support and consulting services to Optiv’s clients with expertise in endpoint protection and security solutions as well as providing support and mentoring to other Optiv team members. -
Mcafee Support SmeCdi Llc Jun 2010 - Aug 2011New York City, New York, UsSubject Matter Expert for IBM’s McAfee ePO customers providing support to various client environments from large global enterprises to small networks. Established a unique set of Key Performance Indicators (KPI) providing quality metrics for clients’ environments, resulting in saving over 650 combined work-hours monthly servicing 26 different customer environments from state governments to medical/pharmaceutical providers, manufacturing and global retailers with key performance indicators and a revised methodology used throughout the IBM team. -
Information System Security OfficerMidcom May 2009 - May 2010Anaheim, Ca, UsContracted to Boeing supporting the Global Security Center interfacing between Boeing and Defense Security Services (DSS). Reviewing, assessing, and documenting various operational and manufacturing environments for classified processing gaining approval to operate within the Defense Security Services (DSS) guidelines. -
Implementation SpecialistNetconn Dec 2008 - Apr 2009São Paulo, Sp, BrRapid Deployment Team delivering the Host-based Security System (HBSS) comprised of McAfee ePO 4.0, HIPS 7.0, VSE 8.7, and other tools designed for the DoD. Providing installation, configuration, and technical support to customer sites during the deployment phase. Making site visits to install and configure new systems to ensure STIG compliance and train local system administrators in using the system for day-to-day operations. -
AssociateBooz Allen Hamilton Mar 2008 - Aug 2008Mclean, Va, UsAir Force Enterprise Information Services (AF EIS) Implementation Team providing help desk and training support. Building the help desk function to support all Air Force users world-wide during the implementation phase of the AF EIS Integration. Identified and developed processes, methods, and techniques for tracking issues, charting activities, monitoring support areas, and projecting areas of need. Simultaneously delivering training to customer locations (MAJCOMs) and working with the Training Development team in a four-day course providing both basic operations of the AF EIS suite and Instructor Training for the trainers in the MAJCOMs so they can provide similar training to users and administrators alike. -
AssociateBooz Allen Hamilton Nov 2007 - Mar 2008Mclean, Va, UsInfrastructure Systems Program Office (AF PKI SPO). Building training material for both instructor-led and web-based training. Providing training in the classroom to end-users and system administrators. Working closely with the web development team providing ready-made content.US Army Cryptographic Modernization Assessment of Alternatives study team. Researched current and projected upgrades to the US Army's cryptographic equipment for fixed and deployed operating conditions. Analyzed impact of changes for future requirements, end-of-life issues for specific algorithms, impact of changes in key segments, and proposed architecture changes. -
AssociateBooz Allen Hamilton Mar 2005 - Nov 2007Mclean, Va, UsMember of a three-member team with the 26th Operational Support Squadron providing up-to-date information on a wide range of Air Force projects and initiatives concerning network operations and security. Chief among these were Vulnerability Lifecycle Management System (VLMS), Email for Life (E4L), Second Generation Wireless (2GWLAN), and Host-based Security System (HBSS). Current operations information provided for broad situational awareness for the 26OSS and 67 NWW leadership.Training Manager for the Combat Information Transport System (CITS) Block 35 Vulnerability Lifecycle Management System (VLMS) initiative. As the Booz Allen site lead of a three-man team, prepared and delivered training material for the VLMS system using DoD specified tools and existing AF legacy software to produce a blended environment of network-wide security assessment and patch/remediation deployment in a three-tiered infrastructure. Conducted site-surveys, prepared installation specifications and diagrams, identified necessary changes to site facility power and air handling systems to accommodate the new equipment to be installed. -
Senior AnalystComputer Sciences Corporation (Csc) Jan 2004 - Mar 2005Contract lead building the the US Air Force Virus Analysis Team managing over 1M endpoints globally, defining anti-malware policies and configuration, and identifying response to potential threats with a very small team. Primary analyst and support technician provided anti-virus product support to all Air Force Major Commands, Agencies and Units. Maintained anti-virus support servers for the Air Force, solved support problems with anti-virus software (Trend Micro, Symantec, and McAfee anti-virus products) protecting all Air Force networks world-wide, resolved issues with any malicious logic, and provided a proactive response where possible. Devised unique solutions to various problems or situations where no solution previously existed. Guided the establishment or creation of numerous policies concerning network security practices. Created a web interface to keep customers aware of current anti-virus software updates with detection signatures and software upgrades. Designed and implemented an internal test network to assist in troubleshooting various software problems or configuration errors for customers world-wide. -
Senior AnalystGeneral Dynamics Information Technology Jun 2002 - Jan 2004Falls Church, Virginia, UsIntrusion Detection Analysis monitoring the customer’s network for intrusions and malware incidents. Provided correlation analysis of new vulnerabilities, potential intrusion threats, and viruses for overall incident responses. Developed various database queries and reports on monitored traffic for trend analysis, network traffic load analysis, and forecasting analysis. Conducted analysis of multi-source, multi-system networks using Automated Security Incident Measurement (ASIM) data and the Common Intrusion Detection Director platform. -
Senior AnalystVeridian Information Solutions Inc Apr 2001 - Jun 2002Monitored and evaluated the customer’s network for current and potential threats from external attacks, malicious logic, software vulnerability exploits with intrusion detection and various vulnerability assessment tools. Tested and assessed various commercial network and host-based intrusion detection systems for use with the ASIM director/client product. Developed new methods of analyzing network traffic load and the impact on the customer's network environment. -
Cyber Security AnalystVeridian Information Solutions Inc Jan 1999 - Apr 2001Performed various roles within the DoD customer’s operating environment. Primary duties included Level I (Help Desk) Technician, Real-Time Analysis, Correlation Analysis, and Virus Analysis Team. Performed intrusion detection and analysis of network activity, and assessment of malware events and vulnerability threats with ASIM/CIDD. Provided the customer with proactive measures to prevent the spread of malware and vulnerability threats as they appeared. Developed unique methods of assessing potential threat from malware and external attacks. Created malicious logic handling and response policies and procedures used throughout the Air Force. Co-founded a Federal forum for virus analysis from various federal agencies and offices including NIPC, CIA, CIAC, and DoD to openly discuss virus events, tactics, responses, and strategies for supporting various federal network infrastructures. -
Installation EngineerTrident Data Systems May 1998 - Jan 1999UsInstallation of dial-up VPN solution for banks accessing the Federal Home Loan Bank (FHLB) system to transfer funds to and from branch institutions in a five-state region using Sun Screen and SKIP as well as dedicated routers and modems. Repeatedly recognized for excellence in customer support of both the FHLB office and their branch-bank customers. -
Staff SergeantUnited States Air Force May 1989 - May 1998Randolph Afb, Tx, UsSecure Communications Systems Technician supporting cryptographic, voice, data, telemetry, teletype, and computer networks as a technician and career-field instructor.1990 to 1993 - RAF Uxbridge supporting Desert Storm and the DEB communications (cryptographic systems and teletype communications equipment). 1993 - 6948 ESS, Medina Annex, Lackland AFB, San Antonio Cryptographic Systems and Teletype Technician,1993 - 1998 342 TRS Master Instructor Lackland AFB writing, and delivering the 306x6 (later 2E3x1) privileged and honored to have trained more than 400 students through the initial AFSC course. Also served on the Base Honor Guard providing recognition and honors for over 150 Air Force members and their families.
Robert K. Education Details
-
Sam Houston State UniversityCriminology -
Community College Of The Air ForceInstructor Of Technology And Military Science -
Community College Of The Air ForceElectronics And Telecommunication Systems
Frequently Asked Questions about Robert K.
What is Robert K.'s role at the current company?
Robert K.'s current role is Technical Sales Engineer | Solution Architect | Cyber Resilience | Security Evangelist | US Air Force Veteran | seriously good barbeque.
What schools did Robert K. attend?
Robert K. attended Sam Houston State University, Community College Of The Air Force, Community College Of The Air Force.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial