JOSEPH DE SARAM
Computer Scientist / Human Rights Activist
Архитектор информационной безопасности
مهندس أمن المعلومات
with Expertise in the Field of
Information Security Architecture.
the Conceptualisation and Design of
Wide Area Distributed Systems
Advanced Neural Networks
and Strong Cryptographics.
Clients comprise those from
Aerospace & Defence
and Banking & Securities.
Click the logo or scroll to get started

ABOUT JOE

A Computer Scientist with expansive conceptual abilities in Information Security.

Joseph de Saram has significant expertise in the fields of Information Security Architecture, Intelligence Analysis and Digital Forensics. Areas of specialisation include the conceptualisation and design of wide area distributed systems, advanced neural networks, and strong cryptographics. Proven thought leadership, business development and technical mindset have evolved over thirty years. 

Proficient, hardworking and focussed, Joseph is able to optimise and greatly enhance existing methodologies by extremely rapid assimilation of new material and modification of structured procedures. He achieves organisational competency through enforcing tough deadlines and rationalisation, and motivating co-workers to optimum efficiency.

Furthermore Joseph’s successful management of clandestine operations from design to delivery in terms of confidentiality, integrity and availability have led to significant improvements in the quality and performance of Intelligence, Surveillance, and Reconnaissance (C4ISR) aspects.

Objective

To provide robust intellect to Aerospace & Defense contracting organisations (including under limited access authorizations) within extremely challenging environments, which demand neoteric solutions. Strong engineering acumen must be a prerequisite, with few limits to remuneration. 

JOSEPH DE SARAM   CISSP FBCS FCMI FIAP MIEEE MINCOSE MIScT MACS Snr CP

Information Security Architect ● אדריכל אבטחת מידע ● 信息安全建築師 ● Архитектор информационной безопасности ● مهندس أمن المعلومات

Generic address [email protected] • CP500i +807 1742 5273 

Transient routing problems may be experienced for the next two weeks or so as configurations are finalised… 

Country-Specific sites:

QUOTES

HUMAN RIGHTS

Joseph de Saram has always promoted and campaigned for the Fundamental Human Rights and freedoms that humans are entitled to. A ‘human rights activist’ typically brings out the various human rights violations in the public domain and campaigns to restore these rights, and since the late 1990s Joseph’s focus has been cryptographic projects involving:- 

Article 12

No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

Article 19

Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.

After the Torture and [Political] Psychiatric Fraud of 2015, Joseph truly understood first-hand, the significance of:-

Article 3

Everyone has the right to life, liberty and security of person.

Article 8

Everyone has the right to an effective remedy by the competent national tribunals for acts violating the fundamental rights granted him by the constitution or by law.

Article 5

No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment.

Article 9

No one shall be subjected to arbitrary arrest, detention or exile.

Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment

The States Parties to this Convention, Considering that, in accordance with the principles proclaimed in the Charter of the United Nations, recognition of the equal and inalienable rights of all members of the human family is the foundation of freedom, justice and peace in the world, Recognizing that those rights derive from the inherent dignity of the human person, Considering the obligation of States under the Charter, in particular Article 55, to promote universal respect for, and observance of, human rights and fundamental freedoms, Having regard to article 5 of the Universal Declaration of Human Rights and article 7 of the International Covenant on Civil and Political Rights, both of which provide that no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment, Having regard also to the Declaration on the Protection of All Persons from Being Subjected to Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, adopted by the General Assembly on 9 December 1975, Desiring to make more effective the struggle against torture and other cruel, inhuman or degrading treatment or punishment throughout the world, Have agreed as follows: limits to remuneration. 

Part 1

Article 1

1. For the purposes of this Convention, the term "torture" means any act by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person for such purposes as obtaining from him or a third person information or a confession, punishing him for an act he or a third person has committed or is suspected of having committed, or intimidating or coercing him or a third person, or for any reason based on discrimination of any kind, when such pain or suffering is inflicted by or at the instigation of or with the consent or acquiescence of a public official or other person acting in an official capacity. It does not include pain or suffering arising only from, inherent in or incidental to lawful sanctions

Article 4

1. Each State Party shall ensure that all acts of torture are offences under its criminal law. The same shall apply to an attempt to commit torture and to an act by any person which constitutes complicity or participation in torture.

2. Each State Party shall make these offences punishable by appropriate penalties which take into account their grave nature.

INFORMATION SECURITY

Cryptography
Theory

Banking and Financial Systems

Network Operations
Security

P2P Payment
Authentication

Cryptographically
Secure PRNGs

Key Exchange
Mechanisms

Applied
Cryptography

Secure Distributed
Architectures

Assurance via
Non Repudiation

Multidimensional
Obfuscation

Advanced Neural
Networks

Computational
Infeasibility

Biometric
Authentication

Application
Security

Disaster Recovery
BCP

Financial Network
Security

Law and Forensic
Investigation

CORE INFORMATION SECURITY COMPETENCE

0%
Applied
Cryptography
0%
Forensics & Law
Enforcement
0%
Distributed
Architectures
0%
Multidimensional
Obfuscation
0%
Operations
Security
0%
Advanced Neural
Networks
0%
Computational
Infeasibility

INFOSEC OVERVIEW

28yrs 02mths (338mths)
28yrs 01mths (337mths)
26yrs 10mths (322mths)
26yrs 03mths (315mths)
28yrs 02mths (338mths)
28yrs 00mths (336mths)
26yrs 08mths (320mths)
25yrs 07mths (307mths)

INFORMATION ARCHITECTURE

28yrs 02mths (338mths)
28yrs 01mths (337mths)
27yrs 03mths (327mths)
27yrs 11mths (335mths)
28yrs 00mths (336mths)
25yrs 07mths (307mths)

PROJECT MANAGEMENT

28yrs 03mths (339mths)
28yrs 02mths (338mths)
26yrs 07mths (319mths)
28yrs 00mths (336mths)
27yrs 03mths (327mths)
26yrs 08mths (320mths)

SYSTEMS ENGINEERING PRINCIPLES

28yrs 03mths (339mths)
28yrs 02mths (338mths)
28yrs 01mths (337mths)
28yrs 00mths (336mths)

SFIA 7 INFOTECH EXPERIENCE

SFIA describes skills and competencies required by professionals in roles involved in information and communication technologies, digital transformation and software engineering. SFIA was formally launched in 2000 and its provenance can be traced back to the 1980s and a number of collaborative skills and competency projects. These led to the SFIA Framework and the formation of the SFIA Foundation which has become an international not-for-profit organisation that now brings together the global community to develop and maintain the SFIA Framework for the benefit of all.


SFIA has become the globally accepted common language for the skills and competencies related to information and communication technologies, digital transformation and software engineering.SFIA remains a collaboration – it has been regularly updated through a global open consultation process. People with real practical experience of developing and managing skills/competencies in corporate, public sector and educational environments from all around the world, contribute to ensuring SFIA remains relevant and true. It is built by industry and business for industry and business.

It is these components that set SFIA apart from other frameworks and has resulted in its adoption by governments, corporates and individuals in almost 200 countries. Its unique and ongoing success can also be attributed to:

Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)
Security Operations Architecture (1993-2019)

STRATEGY AND ARCHITECTURE

INFORMATION STRATEGY

Enterprise IT governance
GOVN

Information systems coordination

ISCO

Analytics

INAN

Strategic planning

ITSP

Information security

SCTY

Data visualisation

VISL

5

Information governance

IRMG

Information assurance

INAS

Information content publishing

ICPM

6

ADVICE AND GUIDANCE

Consultancy

CNSL

Specialist advice

TECH

6

BUSINESS STRATEGY AND PLANNING

Demand management

DEMM

6

Innovation

INOV

Knowledge management

KNOW

6

Knowledge management

KNOW

6

IT management

ITMG

Research

RSCH

6

Enterprise & Business architecture

STPL

7

Financial management

FMIT

6

Business process improvement

BPRE

6

Business risk management

BURM

7

TECHNICAL STRATEGY AND PLANNING

Emerging technology monitoring

EMRG

6

Solution architecture

ARCH

6

Continuity management

COPL

5

Data management

DATM

6

Network planning

NTPL

6

Methods and tools

METL

6

CHANGE & TRANSFORMATION

BUSINESS CHANGE IMPLEMENTATION

Portfolio management

POMG

7

Portfolio, programme & project support

PROF

6

Programme management

PGMG

6

Project management

PRMG

7

BUSINESS STRATEGY AND PLANNING

Business analysis

BUAN

6

Organisational capability development

OCDV

Business process testing

BPTS

6

Business modelling

BSMO

6

Organisation design & implementation

ORDI

7

Benefits management

BENM

6

Requirements definition, management

REQM

6

Change implementation planning & mgt

CIPM

6

DEVELOPMENT AND IMPLEMENTATION

SYSTEMS DEVELOPMENT

Systems development management

DLMG

7

Programming / Software development

PROG

6

Data modelling and design

DTAN

5

Testing

TEST

6

Systems design

DESN

6

Real-time / Embedded systems devel...

RESD

6

Database design

DBDS

5

Safety engineering

SFEN

6

Software design

SWDN

6

Animation development

ADEV

4

Network design

NTDS

6

Information content authoring

INCA

6

USER EXPERIENCE

User research

URCH

6

User experience evaluation

USEV

5

User experience analysis

UNAN

5

User experience design

HCEV

6

INSTALLATION AND INTEGRATION

Systems Inst / Decom

HSIN

5

Porting / Software configuration

PORT

6

Hardware design

HWDE

6

DELIVERY AND OPERATION

SERVICE DESIGN

Availability management

AVMT

6

Service level managemen

SLMO

5

SERVICE TRANSITION

Service acceptance

SEAC

6

Change management

CHMG

6

Configuration management

CFMG

6

Release and deployment

RELM

6

Asset management

ASMG

6

SERVICE OPERATION

System software

SYSP

5

Penetration testing

PENT

6

IT infrastructure

ITOP

4

Network support

NTAS

5

Capacity management

CPMG

6

Radio frequency engineering

RFEN

6

Database administration

DBAD

5

Problem management

PBMG

5

Security administration

SCAD

6

ASUP

ADEV

5

Storage management

STMG

6

Incident management

USUP

5

SKILLS AND QUALITY

SKILL MANAGEMENT

Learning & development management

ETMG

7

Learning delivery

ETDL

5

Configuration management

LEDA

6

Teaching and subject formation

TEAC

5

Learning design and development

TMCR

5

PEOPLE MANAGEMENT

Performance management

PEMT

6

Resourcing

RESC

5

Professional development

PDSV

6

QUALITY AND CONFORMANCE

Quality management

QUMG

7

Conformance review

CORE

6

Configuration management

CFMG

6

Safety assessment

SFAS

6

Asset management

ASMG

6

Digital forensics

DGFS

6

RELATIONSHIPS AND ENGAGEMENT

STAKEHOLDER MANAGEMENT

Sourcing

SORC

6

Relationship management

RLMT

7

Supplier management

SUPP

6

Customer service support

CSMG

5

Contract management

ITCM

6

SALES AND MARKETING

Marketing

MKTG

6

Product management

PROD

6

Selling

SALE

6

Selling

SSUP

5

OTHER INFOTECH EXPERIENCE

DESKTOP OS EXPERIENCE

Microsoft MS-DOS 3.2 to Windows 10 (1992-2021)

29yrs 04mths (352mths)

BSD OpenBSD 5.6 to 6.4 (2014-2021)

07yrs 07mths (91mths)

Red Hat Enterprise Linux 3 U1 to 7.6 (2004-2021)

17yrs 07mths (211mths)

Acorn MOS to RISC OS (1982-2005)

23yrs 10mths (286mths)

Apple Mac OS 8.1 to 10.14.2 (1998-2021)

23yrs 08mths (284mths)

Oracle Linux 6 to 7.6 (2014-2021)

07yrs 04mths (88mths)

Canonical Ubuntu 9.04 tp 18.10 (2008-2021)

13yrs 03mths (159mths)

Unix System II to System V R4 (1982-1991)

09yrs 09mths (117mths)

PROGRAMMING LANGUAGE EXPERIENCE

PL/SQL Procedural Language/SQL (2002-2021)

19yrs 07mths (228mths)

PASCAL A high level programming lang (1982-1990)

08yrs 10mths (106mths)

ALGOL 68 Algorithmic Language 1968 (1982-1985)

03yrs 08mths (44mths)

COBOL Common Business-Oriented Lang (1982-1990)

8yrs 10mths (106mths)

BASIC Beginner's All-purpose Symb Ins (1982-2005)

23yrs 10mths (286mths)

FORTAN 77-90 Formula Translating Sys (1982-1990)

08yrs 10mths (106mths)

ADA Used by US Dept of Defense (1982-1985)

03yrs 09mths (45mths)

MOBILE OS EXPERIENCE

iPhone OS 3.0 to iOS 12.1 (2009-2021)

12yrs 07mths (151mths)

Nokia Series 60 to Nokia Belle (2000-2012)

08yrs 10mths (106mths)

Donut 1.6 to Pie 9.0.0 (2009-2021)

12yrs 01mths (145mths)

DATABASE EXPERIENCE

Microsoft SQL Server 2005 to 2017 (2005-2019)

14yrs 04mths (172mths)

ORACLE Oracle 12c to 6i (1999-2017)

19yrs 00mths (228mths)

MYSQL MySQL Classic (2004-2017)

13yrs 00mths (168mths)

ENTERPRISE RESOURCE PLANNING

SAP R/3 and R/3 Enterprise

Release 3.0F-4.6C / 4.70 (1997-2010)

mySAP Customer RM

CRM 3.0 / 3.1 / 4.0 (2002-2005)

mySAP Business Intelligence

BW 2.0B / 2.1 / 3.0A / 3.0B (2000-2005)

mySAP Financials

SEM-BW / SEM-BCS 3.1B-3.50 (2002-2005)

PR & MEDIA SITES

PR & MEDIA SITES

SFIA describes skills and competencies required by professionals in roles involved in information and communication technologies, digital transformation and software engineering. SFIA was formally launched in 2000 and its provenance can be traced back to the 1980s and a number of collaborative skills and competency projects. These led to the SFIA Framework and the formation of the SFIA Foundation which has become an international not-for-profit organisation that now brings together the global community to develop and maintain the SFIA Framework for the benefit of all. SFIA has become the globally accepted common language for the skills and competencies related to information and communication technologies, digital transformation and software engineering. 

UCL PI Newspaper™

www.pimediaonline.co.uk

The Independent™

www.independent.co.uk

Rhodium PLC™

www.rhodium.com

The Eckington Leader™

www.derbyshiretimes.co.uk

Deloitte & Touche Fast 50™

www2.deloitte.com/uk/en.html

North Derbyshire Chambe...

www.emc-dnl.co.uk

Business in Yorkshire™

www.joseph-de-saram-rhodium...

Business Matters™

www.bmmagazine.co.uk

Yorkshire Business Insider™

www.insidermedia.com/publicatio...

The Sunday Times™

www.thetimes.co.uk

The Daily Telegraph™

www.telegraph.co.uk

The Star™

www.thestar.co.uk

Britains Richest Asian 2000™

www.theasianbusinessawards.co.uk

The Evening Standard™

www.standard.co.uk

The Nation™

www.thenation.org.uk

The Daily Mail™

www.dailymail.co.uk

The Daily Scottish Mail™

www.thecourier.co.uk/tag/scottish...

The Metro London™

www.metro.co.uk

News Lanka™

www.newslanka.net

Derbyshire Times™

www.derbyshiretimes.co.uk

The Financial Mail on Sunday™

www.mailonsunday.co.uk/mailons...

The Island™

www.island.lk

Financial Times™

www.ft.lk

The Sunday Leader™

www.thesundayleader.lk

Singapore Computer Society...

www.scs.org.sg/index.php

CONTACT

Joseph de Saram CISSP FBCS FCMI FIAP MIEEE MINCOSE MIScT MACS Snr CP
Information Security Architect / Intelligence Analyst / Computer Scientist / COMSEC / SIGINT / TSCM