JOSEPH S R DE SARAM
Computer Scientist
Архитектор информационной безопасности
مهندس أمن المعلومات
with Expertise in the Field of
Information Security Architecture.
the Conceptualisation and Design of
Wide Area Distributed Systems
Advanced Neural Networks
and Strong Cryptographics.
Clients comprise those from
Aerospace & Defence
and Banking & Securities.
Click the logo or scroll to get started

ABOUT JOE

A Computer Scientist with expansive conceptual abilities in Information Security.

Joseph S R de Saram has significant expertise in the fields of Information Security Architecture, Intelligence Analysis and Digital Forensics. Areas of specialisation include the conceptualisation and design of wide area distributed systems, strong cryptographics and advanced neural networks.

Proven thought leadership, business development and technical mindset have evolved over thirty years, and Joseph is regarded highly by his peers within the realms of information security and law enforcement.

Tenacious, proficient and focussed, Joseph is able to optimise and greatly enhance existing methodologies by his extremely rapid assimilation of new material and modification of structured procedures. He achieves organisational competency through enforcing tough deadlines and rationalisation, concurrently commanding respect from co-workers when striving for optimum efficiency.

Joseph’s successful management of clandestine operations from design to delivery in terms of confidentiality, integrity and availability have led to significant improvements in the quality and performance of Intelligence, Surveillance, and Reconnaissance (C4ISR) aspects.

Objective

To provide robust intellect to Aerospace & Defense contracting organisations (including under limited access authorizations) within extremely challenging environments, which demand neoteric solutions.
Strong engineering acumen must be a prerequisite, with few limits to remuneration.

Joseph S R de Saram CISSP CITP FBCS FCMI FIAP MIEEE MINCOSE MIScT MACS (SNR) CP (CYBER)

Information Security Architect ● אדריכל אבטחת מידע ● 信息安全建築師 ● Архитектор информационной безопасности ● مهندس أمن المعلومات

Transient routing problems may be experienced for the next two weeks or so as configurations are finalised… 

Country-Specific sites:

QUOTES

INFORMATION SECURITY

Cryptography
Theory

Banking and Financial
Systems

Network Operations
Security

P2P Payment
Authentication

Cryptographically
Secure PRNGs

Key Exchange
Mechanisms

Applied
Cryptography

Secure Distributed
Architectures

Assurance via
Non Repudiation

Multidimensional
Obfuscation

Advanced Neural
Networks

Computational
Infeasibility

Biometric
Authentication

Application
Security

Disaster Recovery
BCP

Financial Network
Security

Law and Forensic
Investigation

CORE INFORMATION SECURITY COMPETENCE

0%
Applied
Cryptography
0%
Forensics & Law
Enforcement
0%
Distributed
Architectures
0%
Multidimensional
Obfuscation
0%
Operations
Security
0%
Advanced Neural
Networks
0%
Computational
Infeasibility

INFOSEC OVERVIEW

30y 10m (370m)
30y 09m (369m)
29y 11m (359m)
28y 11m (347m)
30y 10m (370m)
30y 08m (368m)
29y 04m (352m)
28y 03m (339m)

INFORMATION ARCHITECTURE

30y 10m (370m)
30y 09m (369m)
29y 11m (359m)
30y 07m (367m)
30y 08m (368m)
28y 03m (339m)

PROJECT MANAGEMENT

30y 11m (371m)
30y 10m (370m)
29y 03m (353m)
30y 08m (368m)
29y 11m (359m)
29y 04m (352m)

SYSTEMS ENGINEERING

30y 11m (371m)
30y 09m (369m)
30y 08m (368m)
30y 11m (371m)
30y 10m (370m)

CLOUD SECURITY

13y 04m (160m)
13y 01m (157m)
12y 08m (152m)
13y 02m (158m)
12y 11m (155m)
12y 07m (151m)

GOVERNANCE RISK AND COMPLIANCE

12y 02m (146m)
12y 00m (144m)
11y 08m (140m)
12y 02m (146m)
11y 11m (143m)
11y 07m (139m)

SECURE SOFTWARE LIFECYCLE

15y 03m (183m)
17y 02m (206m)
15y 10m (190m)
15y 08m (188m)
16y 04m (196m)
17y 01m (205m)
16y 08m (200m)
14y 01m (169m)

SFIA 8 INFOTECH EXPERIENCE

SFIA describes skills and competencies required by professionals in roles involved in information and communication technologies, digital transformation and software engineering. SFIA was formally launched in 2000 and its provenance can be traced back to the 1980s and a number of collaborative skills and competency projects. These led to the SFIA Framework and the formation of the SFIA Foundation which has become an international not-for-profit organisation that now brings together the global community to develop and maintain the SFIA Framework for the benefit of all.

SFIA has become the globally accepted common language for the skills and competencies related to information and communication technologies, digital transformation and software engineering.SFIA remains a collaboration – it has been regularly updated through a global open consultation process. People with real practical experience of developing and managing skills/competencies in corporate, public sector and educational environments from all around the world, contribute to ensuring SFIA remains relevant and true. It is built by industry and business for industry and business.

It is these components that set SFIA apart from other frameworks and has resulted in its adoption by governments, corporates and individuals in almost 200 countries. Its unique and ongoing success can also be attributed to:

Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)

STRATEGY AND ARCHITECTURE

Strategy and Planning

Strategic planning

ITPS

5
6
7
Enterprise & business architecture

STPL

5
6
7
Emerging technology monitoring

EMRG

4
5
6
Investment appraisal

INVA

4
5
6
Sustainability

SUST

4
5
6
Information systems coordination

ISCO

6
7
Solution architecture

ARCH

4
5
6
Research

RSCH

2
3
4
5
6
Financial management

FMIT

4
5
6
Continuity management

COPL

2
3
4
5
6
Information management

IRMG

4
5
6
7
Innovation

INOV

5
6
7
Demand management

DEMM

5
6
Measurement

MEAS

3
4
5
6

Security and privacy

Information security

SCTY

3
4
5
6
7
Vulnerability research

VURE

3
4
5
6
Information assurance

INAS

3
4
5
6
7
Threat intelligence

THIN

2
3
4
5
6
Personal data protection

PEDP

5
6

Governance, risk and compliance

Governance

GOVN

6
7
Quality management

QUMG

3
4
5
6
7
Risk management

BURM

3
4
5
6
7
Quality assurance

QUAS

3
4
5
6
Audit

AUDT

3
4
5
6
7

Advice and guidance

Consultancy

CNSL

4
5
6
7
Specialist advice

TECH

4
5
6
Methods and tools

METL

3
4
5
6

CHANGE & TRANSFORMATION

CHANGE IMPLEMENTATION

Portfolio management

POMG

5
6
7
Portfolio, programme & project support

PROF

2
3
4
5
6
Programme management

PGMG

6
7
Project management

PRMG

4
5
6
7

Change analysis

Business situation analysis

BUSA

3
4
5
6
Business modelling

BSMO

2
3
4
5
6
Feasibility assessment

FEAS

3
4
5
6
Acceptance testing

BPTS

2
3
4
5
6
Requirements definition, management

REQM

2
3
4
5
6

Change planning

Business process improvement

BPRE

5
6
7
Organisational change management

CIPM

3
4
5
6
Organisational capability development

OCDV

5
6
7
Benefits management

BENM

5
6
Organisation design & implementation

ORDI

4
5
6
7

DEVELOPMENT AND IMPLEMENTATION

SYSTEMS DEVELOPMENT

Product management

PROD

3
4
5
6
Systems design

DESN

3
4
5
6
Hardware design

HWDE

3
4
5
6
Testing

TEST

1
2
3
4
5
6
Safety assessment

SFAS

4
5
6
Systems development management

DLMG

5
6
7
Software design

SWDN

2
3
4
5
6
Programming / Software development

PROG

2
3
4
5
6
Real-time/embedded systems devt.

RESD

2
3
4
5
6
Radio frequency engineering

RFEN

2
3
4
5
6
Systems & Software life cycle engineering

SLEN

4
5
6
7
Network design

NTDS

3
4
5
6
Systems integration and build

SINT

2
3
4
5
6
Safety engineering

SFEN

3
4
5
6
Animation development

ADEV

3
4
5
6

Data and analytics

Data management

DATM

4
5
6
Data engineering

DESN

2
3
4
5
6
Machine learning

MLNG

2
3
4
5
6
Data modelling and design

DTAN

2
3
4
5
Database administration

DBAD

2
3
4
5
Business intelligence

BINT

2
3
4
5
Database design

DBDS

3
4
5
Data science

DATS

2
3
4
5
6
7
Data visualisation

VISL

3
4
5

User experience

User research

URCH

3
4
5
6
User experience evaluation

USEV

2
3
4
5
6
User experience analysis

UNAN

3
4
5
User experience design

HCEV

3
4
5
6

Content management

Content authoring

INCA

1
2
3
4
5
6
Content publishing

ICPM

1
2
3
4
5
6
Knowledge management

KNOW

2
3
4
5
6
7

Computational science

Scientific modelling

SCMO

4
5
6
7
Numerical analysis

NUAN

4
5
6
7
High-performance computing

HPCC

4
5
6
7

DELIVERY AND OPERATION

Technology management

Technology service management

ITMG

5
6
7
System software

SYSP

3
4
5
Configuration management

CFMG

2
3
4
5
6
Facilities management

DCMA

2
3
4
5
6
Application support

ASUP

2
3
4
5
Network support

NTAS

2
3
4
5
Release and deployment

RELM

3
4
5
6
IT infrastructure

ITOP

1
2
3
4
5
Systems installation and removal

HSIN

1
2
3
4
5
Storage management

STMG

3
4
5
6

Service management