JOSEPH S R DE SARAM
Computer Scientist / Human Rights Activist
Архитектор информационной безопасности
مهندس أمن المعلومات
Click the logo or scroll to get started
with Expertise in the Field of
Information Security Architecture.
Areas of Specialisation include
the Conceptualisation and Design of
Wide Area Distributed Systems
Advanced Neural Networks
and Strong Cryptographics.
Clients comprise those from
Aerospace & Defence
and Banking & Securities.
Click the logo or scroll to get started

ABOUT JOE

A Human Rights Activist with expansive conceptual abilities in Information Security.

Joseph S R de Saram has expertise in the fields of Information Security Architecture, Intelligence Analysis and Digital Forensics. Areas of specialisation include the conceptualisation and design of wide area distributed systems, advanced neural networks, and strong cryptographics. Proven thought leadership, business development and technical mindset have evolved over thirty years. Competent hard-working and focussed, Joseph is able to optimise and greatly enhance existing methodologies by extremely rapid assimilation of new material and modification of structured procedures.

Joseph achieves organisational competency through enforcing tough deadlines and rationalisation, and motivating co-workers to optimum efficiency. Furthermore Joseph’s successful implementation of complex projects from concept to delivery in terms of confidentiality, integrity and availability lead to significant improvement in the quality and performance of complex software algorithms.

LATEST

20180517 UPDATES ACROSS ALL SITES

SITES

HUMAN RIGHTS

INFORMATION SECURITY

Cryptography Theory

Banking and Financial Systems

Network Operations Security

P2P Tunnelling Protocols

Cryptographically Secure PRNGs

Key Exchange Mechanisms

Applied Cryptography

Secure Distributed Architectures

Assurance via Non-Repudiation

Multidimensional Obfuscation

Advanced Neural Networks

P2P Payment Authentication

Computational Infeasibility

Biometric Authentication

Application Security

Disaster Recovery / BCP

Financial Network Security

Law and Forensic Investigation

INFOSEC EXPERIENCE

  • Applied Cryptographics (1993-2018)
    24yrs 8mths (288mths)

  • Telecommunications and Network Security (1993-2018)
    24yrs 8mths (288mths)

  • Operations Security (1993-2018)
    24yrs 8mths (288mths)

  • Hybrid and Emerging Technology (1993-2018)
    24yrs 7mths (288mths)

  • Security Leadership and Management (1993-2018)
    24yrs 6mths (288mths)

  • Information Security Governance and Risk (1995-2018)
    22yrs 9mths (264mths)

  • Forensic Science, Investigations and Techniques (1996-2018)
    22yrs 0mths (264mths)

  • System Security Engineering (1997-2018)
    21yrs 2mths (252mths)

  • Software Development Security (1998-2018)
    20yrs 1mths (240mths)

  • Requirements Analysis and Security Standards (1998-2018)
    20yrs 1mths (240mths)

  • Physical Security Integration (1998-2018)
    19yrs 9mths (228mths)

  • Security Lifecycle Management (1998-2018)
    19yrs 7mths (228mths)

  • Certification and Accreditation / Risk Management (1998-2018)
    19yrs 4mths (228mths)

  • Security Architecture Analysis and Design (1999-2018)
    19yrs 2mths (228mths)

  • Enterprise-Wide System Development Security (1999-2018)
    19yrs 2mths (228mths)

  • Enterprise Security Management Practices (1999-2018)
    18yrs 9mths (216mths)

  • Access Control Systems and Methodology (1999-2018)
    18yrs 7mths (216mths)

  • Government Information Security Assurance (1999-2018)
    18yrs 2mths (216mths)

  • Business Continuity Planning and Disaster Recovery (2000-2018)
    18yrs 9mths (216mths)

  • Legal, Regulations, Investigation and Compliance (2000-2018)
    17yrs 10mths (204mths)

Applied Cryptography

Forensics & Law Enforcement

Distributed Architectures

Multidimensional Obfuscation

Operations Security

Advanced Neural Networks

Computational Infeasibility

INFORMATION TECHNOLOGY (SFIA 6)

Strategy and Architecture

Information strategy

IT governance
GOVN
567
 
IT Strategy & Planning
ITSP
567
 
Information management
IRMG
4567
 
Information systems coordination
ISCO
67
 
Information security
SCTY
34567
 
Information assurance
INAS
567
 
Analytics
INAN
34567
 
Information content publishing
ICPM
123456  
 

Advice and guidance

Consultancy
CNSL
567
 
Technical specialism
TECH
456  
 

Business strategy and planning

Research
RSCH
23456  
 
IT Management
ITMG
56  
 
Innovation
INOV
56  
 
Business process improvement
BPRE
56  
 
Enterprise and business architecture development
STPL
56  
 
Business risk management
BURM
456  
 
Sustainable strategy
SUST
56  
 

Technical strategy and planning

Emerging technology monitoring
EMRG
456  
 
Continuity management
COPL
45    
 
Software development process improvement
SPIM
56  
 
Sustainability management
SUMI
56  
 
Network planning
NTPL
56  
 
Solution architecture
ARCH
56  
 
Data management
DATM
23456  
 
Methods and tools
METL
456  
 

Skills & Quality

Skill Management

Learning and Development Management
ETMG
234567
 
Learning Assessment and Evaluation
LEDA
3456  
 
Learning Design and Development
TMCR
456  
 
Learning Delivery
ETDL
345    
 
Teaching & Subject Formation
TEAC
56  
 

People Management

Performance Management
PEMT
456  
 
Resourcing
RESC
456  
 

Quality and conformance

Quality management
QUMG
4567
 
Quality assurance
QUAS
3456  
 
Quality standards
QUST
2345    
 
Conformance review
CORE
3456  
 
Safety assessment
SFAS
56  
 
Digital Forensics
DGFS
456  
 

Development and implementation

Systems Development

Systems development management
DLMG
567
 
Data analysis
DTAN
2345    
 
System design
DESN
23456  
 
Network design
NTDS
56  
 
Database design
DBDS
23456  
 
Programming/software development
PROG
2345    
 
Animation development
ADEV
3456  
 
Safety engineering
SFEN
3456  
 
Sustainability engineering
SUEN
456  
 
Information content authoring
INCA
123456  
 
Testing
TEST
123456  
 

User Experience

User experience analysis
UNAN
23456  
 
User experience design
HCEV
3456  
 
User experience evaluation
USEV
23456  
 

Installation and integration

Systems integration
SINT
23456  
 
Porting/software Configuration
PORT
3456  
 
Hardware Design
HWDE
456  
 
Systems installation/decommissioning
HSIN
12345    
 

Change & Transformation

Business change implementation

Portfolio management
POMG
567
 
Programme management
PGMG
67
 
Project management
PRMG
4567
 
Portfolio, programme and project support
PROF
23456  
 

Business change implementation

Business analysis
BUAN
3456  
 
Requirements definition and management
REQM
23456  
 
Business process testing
BPTS
456  
 
Change implementation planning and management
CIPM
56  
 
Organisation design and implementation
ORDI
56  
 
Benefits management
BENM
56  
 
Business modelling
BSMO
23456  
 
Sustainability assessment
SUAS
456  
 

Relationships and engagement

Stakeholder management

Sourcing
SORC
23456  
 
Contract Management
ITCM
456  
 
Relationship management
RLMT
456  
 
Customer Service Support
CSMG
123456  
 

Sales and marketing

Digital Marketing
MKTG
23456  
 
Selling
SALE
456  
 
Sales Support
SSUP
456  
 
Product Management
CSMG
123456  
 

Delivery and Operation

Service Design

Availibility Management
AVMT
456  
 
Service Level Management
SLMO
234567
 

Service Operation

System Software
SYSP
3456  
 
Capacity management
CPMG
456  
 
Security Administration
SCAD
23456  
 
Penetration Testing
PENT
456  
 
Radio Frequency Engineering
RFEN
23456  
 
Application Support
ASUP
1234      
 
IT Infrastructure
ITOP
1234      
 
Database Administration
DBAD
2345    
 
Storage Management
DBAD
2345    
 
Network Support
NTAS
23456  
 
Problem Management
PBMG
2345    
 
Incident Management
USUP
2345    
 
Facilities Management
DCMA
3456  
 

SFIAplus

SFIAplus contains the SFIA framework of IT skills plus detailed training and development resources. Additional competency, training and development detail for all 96 skills and 344 tasks (skill at a level), makes SFIAplus a three dimensional model.The result is the most established and widely adopted IT skills, training and development model that reflects current industry needs.

OPERATING SYSTEMS EXPERIENCE

Microsoft Windows 10 to MS-DOS 3.2 (1992-2018)
Oracle Linux 6 to 7.3 (2014-2018)
BSD OpenBSD 5.6 to 6.0 (2014-2018)
Apple Mac OS 8.1 to 10.12.2 (1981-2018)
Red Hat Enterprise Linux (2004-2018)
Canonical Ubuntu 9.04 (2008-2010)
Unix System III to System V R4 (1982-1991)
Acorn MOS to RISC OS (1982-2005)

PROGRAMMING LANGUAGE EXPERIENCE

PL/SQL [Procedural Language/Structured Query Language] (2002-2018)
BASIC [Beginner’s All-purpose Symbolic Instruction Code] (1982-2005)
PASCAL [a high level programming language] (1982-1990)
FORTRAN 77-90 [Formula Translating System] (1982-1990)
COBOL [Common Business-Oriented language] (1982-1990)
ADA [used by United States Department of Defense] (1982-1985)
ALGOL 68 [Algorithmic Language 1968] (1982-1985)

MOBILE OS EXPERIENCE

iPhone OS 3.0 to iOS 9.2.1 (2009-2018)
Android Donut 1.6 to Nougat 7.1 (2009-2018)
Nokia Series 60 (2000-2012)

ENTERPRISE RESOURCE PLANNING

SAP R/3 and R/3 Enterprise Release 3.0F-4.6C (1997-2010), Release 4.70 (2002-2010)
mySAP Business Intelligence BW 2.0B/2.1C/3.0A/3.0B (2000-2005)
mySAP Customer RM CRM 3.0/3.1/4.0 (2002-2005)
mySAP Financials SEM-BW 3.1B-3.50 (2002-2005), SEM-BCS 3.1B-3.50 (2002-2005)
mySAP Supply Chain
Management
APO 3.1 (2002-2005), SCM 4.0/4.1 (2004-2005)

DATABASE EXPERIENCE

Microsoft SQL Server 2005 to 2016 (2005-2018)
MYSQL MySQL Classic (2004-2018)
ORACLE Oracle 12c to 6i (1999-2018)

QUOTES

Most people wait for it to happen – I prefer to Make I.T. Happen.

Joseph S R de Saram, Information Security Architect

Sure there is no ‘I’ in ‘TEAMWORK’ but there is one in ‘GENIUS’, and also one in ‘RICH’.

Joseph S R de Saram, Information Security Architect

‘State of the Art’ depends greatly on the ability of the artist.

Joseph S R de Saram, Information Security Architect

Everybody is so talented nowadays that the only people I care to honour as deserving real distinction are those who harness encryption.

Joseph S R de Saram, Information Security Architect

Many people dream small and then get surprised when big things don’t happen to them.

Joseph S R de Saram, Information Security Architect

Regardless of what I am playing, my music will never be appreciated when the audience is deaf.

Joseph S R de Saram, Information Security Architect

Trying hard to win is not the same thing as avoiding defeat.

Joseph S R de Saram, Information Security Architect

I am not interested in just answers, I want the right answers.

Joseph S R de Saram, Information Security Architect

Most people associate red for hot and blue for cold – when a flame is blue, it is actually hotter than a red flame, so what do they say then?

Joseph S R de Saram, Information Security Architect

Most battles are won logically in the mind, before the physical battle even starts on the field.

Joseph S R de Saram, Information Security Architect

I have always encouraged my peers to ‘push the envelope’ but when ‘licking the envelope’ is too challenging then you know you will have admin problems.

Joseph S R de Saram, Information Security Architect

‘Finishing in 2nd position’ is just a fancy phrase for ‘being thrashed’.

Joseph S R de Saram, Information Security Architect

Two heads ARE better than one, particularly if one of them is mine.

Joseph S R de Saram, Information Security Architect

I always aspire to perfection as there is no limit as to what perfection could be.

Joseph S R de Saram, Information Security Architect

I do not suffer fools gladly – I get pissed off like everyone else.

Joseph S R de Saram, Information Security Architect

I do not waste time drowning in other people’s stupidity, when there are so many things that can be achieved with a brilliant mind.

Joseph S R de Saram, Information Security Architect

Many people say ‘the glass is half full’; many say ‘the glass is half empty’. Only a few of us ask ‘What’s actually in the glass?’

Joseph S R de Saram, Information Security Architect

When it comes to financial matters, I prefer to follow the best strategy and lose money than listen to mediocre advice and get mediocre results.

Joseph S R de Saram, Information Security Architect

First the people refused martial law, then the people requested martial law, now the people plead for martial law.

Joseph S R de Saram, Information Security Architect

The worst thing about being a genius is that most people are not smart enough to appreciate it.

Joseph S R de Saram, Information Security Architect

When making a critical decision, I would always be prepared to seek forgiveness afterwards, than obtain permission before.

Joseph S R de Saram, Information Security Architect

If I wanted to work with vegetables then I would get a job in a market.

Joseph S R de Saram, Information Security Architect

Nothing beats the assurance of a relationship with a major International Investment Bank, especially when you see their staff wearing Rolex watches.

Joseph S R de Saram, Information Security Architect

If you’re smarter than the people giving you advice then you’re an idiot if you listen to them.

Joseph S R de Saram, Information Security Architect

When I lost my mind for 5 years, I realised what it was like to be ‘Just an Average Joe’.

Joseph S R de Saram, Information Security Architect

I always like to thank those that believed in me, and remember those that didn’t – because without them I would have probably taken an easier path.

Joseph S R de Saram, Information Security Architect

I have found it necessary to define my own paradigms because there is no-one around me whom I can look up to.

Joseph S R de Saram, Information Security Architect

It does not take big balls to stand up for what you believe in – it just takes two.

Joseph S R de Saram, Information Security Architect

They tried to milk me like a cow, but I’m a bull and hate being milked.

Joseph S R de Saram, Information Security Architect

It take ‘Brains, Balls and Financial Muscle’ to help ordinary people solve the extraordinary problems of Fighting Injustice.

Joseph S R de Saram, Information Security Architect

He who sacrifices information security for freedom deserves neither.

Joseph S R de Saram, Information Security Architect

I’m not afraid of Unjust Laws or Corrupt Cops – I have a brilliant legal mind and my favourite colour is blue.

Joseph S R de Saram, Information Security Architect

I prefer to struggle every week to reach for the stars and the high standards I set for myself, than set low standards and achieve them daily.

Joseph S R de Saram, Information Security Architect

Whilst the person who lies will eventually change his story once the pressure becomes too great, the man who speaks the truth cannot change the facts to anything else, even if he faces disbelief and ridicule.

Joseph S R de Saram, Information Security Architect

RESOURCE MATERIALS

20180305

Thank you for visiting today – we are just working on some updates.

 

CONTACT US

If you have a project you would like to discuss, please get in
touch with us.

As a Human Rights Activist, projects relating to Articles 5, 10, 12 and 19 are of
particular interest.

JSRDS +44 123 456 78

*
*
*
*
The form data has been submitted! Thank you.
Oops, An error has ocurred! See the marked fields above to fix the errors.