JOSEPH S R DE SARAM
JOSEPH S R DE SARAM
Computer Scientist / Human Rights Activist
Архитектор информационной безопасности
مهندس أمن المعلومات
Click the logo or scroll to get started
with Expertise in the Field of
Information Security Architecture.
the Conceptualisation and Design of
Wide Area Distributed Systems
Advanced Neural Networks
and Strong Cryptographics.
Clients comprise those from
Aerospace & Defence
and Banking & Securities.
Click the logo or scroll to get started

ABOUT JOE

A Human Rights Activist with expansive conceptual abilities in Information Security.

Joseph S R de Saram has significant expertise in the fields of Information Security Architecture, Intelligence Analysis and Digital Forensics. Areas of specialisation include the conceptualisation and design of wide area distributed systems, advanced neural networks, and strong cryptographics. Proven thought leadership, business development and technical mindset have evolved over thirty years.

Proficient, hardworking and focussed, Joseph is able to optimise and greatly enhance existing methodologies by extremely rapid assimilation of new material and modification of structured procedures. He achieves organisational competency through enforcing tough deadlines and rationalisation, and motivating co-workers to optimum efficiency.

Furthermore Joseph’s successful management of clandestine operations from design to delivery in terms of confidentiality, integrity and availability have led to significant improvements in the quality and performance of Intelligence, Surveillance, and Reconnaissance (C4ISR) aspects.

Objective

To provide robust intellect to Aerospace & Defense contracting organisations (including under limited access authorizations) within extremely challenging environments, which demand neoteric solutions. Strong engineering acumen must be a prerequisite, with few limits to remuneration.

JOSEPH S R DE SARAM   CISSP FBCS MIEEE MIScT MINCOSE MACS Snr CP

Information Security Architect ● אדריכל אבטחת מידע ● 信息安全建築師 ● Архитектор информационной безопасности ● مهندس أمن المعلومات

Generic address [email protected] • CP500i +807 1742 5273

Transient routing problems may be experienced for the next two weeks or so as configurations are finalised...

QUOTES

Joseph de Saram has always promoted and campaigned

HUMAN RIGHTS

Joseph de Saram has always promoted and campaigned for the the Fundamental Human Rights and freedoms that humans are entitled to. A human rights activist typically brings out the various human rights violations in the public domain and campaigns to restore these rights. Since the late 1990s my focus has been cryptographic projects involving:-
img-126-53
Article 12

No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

img-126-53
Article 19

Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.

After the [Political] Psychiatric Fraud of 2015, Joseph truly understood the significance of:-
img-126-53
Article 3

Everyone has the right to life, liberty and security of person.

img-126-53
Article 5

No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment.

img-126-53
Article 8

Everyone has the right to an effective remedy by the competent national tribunals for acts violating the fundamental rights granted him by the constitution or by law.

img-126-53
Article 9

No one shall be subjected to arbitrary arrest, detention or exile.

img-126-53
Article 8

Everyone has the right to an effective remedy by the competent national tribunals for acts violating the fundamental rights granted him by the constitution or by law.

img-126-53
Article 9

No one shall be subjected to arbitrary arrest, detention or exile.

img-126-53
Article 8

Everyone has the right to an effective remedy by the competent national tribunals for acts violating the fundamental rights granted him by the constitution or by law.

img-126-53
Article 9

No one shall be subjected to arbitrary arrest, detention or exile.

INFORMATION SECURITY

Cryptography
Theory

Banking and Financial
Systems

Network Operations
Security

P2P Payment
Authentication

Cryptographically
Secure PRNGs

Key Exchange
Mechanisms

Applied
Cryptography

Secure Distributed
Architectures

Assurance via
Non Repudiation

Multidimensional
Obfuscation

Advanced Neural
Networks

Computational
Infeasibility

Biometric
Authentication

Application
Security

Disaster Recovery
BCP

Financial Network
Security

Law and Forensic
Investigation

Core Information Security Competence

0%
Applied
Cryptography
0%
Forensics & Law
Enforcement
0%
Distributed
Architectures
0%
Multidimensional
Obfuscation
0%
Operations
Security
0%
Advanced Neural
Networks
0%
Computational
Infeasibility

InfoSec Overview

  • Communication & Network Security (1993-2019)
25yrs 10mths (310mths)
  • Security Architecture & Engineering (1993-2019)
25yrs 09mths (309mths)
  • Identity & Access Management (IAM) (1994-2019)
24yrs 11mths (299mths)
  • Security & Risk Management (1995-2019)
23yrs 11mths (287mths)
  • Security Operations (1993-2019)
25yrs 10mths (310mths)
  • Asset Security (1993-2019)
25yrs 08mths (308mths)
  • Security Assessment & Testing (1995-2019)
24yrs 04mths (292mths)
  • Software Development Security (1996-2019)
23yrs 03mths (279mths)

Information Architecture

  • Security Operations Architecture (1993-2019)
25yrs 10mths (310mths)
  • Security Architecture Modeling (1993-2019)
25yrs 09mths (309mths)
  • Identity & Access Management Architecture (1994-2019)
24yrs 11mths (299mths)
  • Architect for Governance, Compliance & Risk (1993-2019)
25yrs 10mths (310mths)
  • Infrastructure Security (1993-2019)
25yrs 08mths (86mths)
  • Architect for Application Security (1996-2019)
23yrs 03mths (279mths)

Project Management

  • Risk Management (1993-2019)
25yrs 10mths (310mths)
  • Contingency Management (1993-2019)
25yrs 10mths (310mths)
  • Leadership & Business Management (1995-2019)
24yrs 04mths (292mths)
  • Threat Intelligence & Incident Management (1993-2019)
25yrs 10mths (310mths)
  • Law, Ethics & Security Compliance (1994-2019)
24yrs 11mths (299mths)
  • Systems Lifecycle Management (1995-2019)
24yrs 04mths (292mths)

Systems Engineering Principles

  • Risk Management (1993-2019)
25yrs 10mths (310mths)
  • Security Planning, Design & Implementation (1993-2019)
25yrs 06mths (306mths)
  • Secure Operations, Maintenance & Disposal (1993-2019)
25yrs 09mths (309mths)
  • Systems Engineering Technical Management (1993-2019)
25yrs 09mths (309mths)

SFIA 7 INFOTECH EXPERIENCE

SFIA describes skills and competencies required by professionals in roles involved in information and communication technologies, digital transformation and software engineering.

SFIA was formally launched in 2000 and its provenance can be traced back to the 1980s and a number of collaborative skills and competency projects. These led to the SFIA Framework and the formation of the SFIA Foundation which has become an international not-for-profit organisation that now brings together the global community to develop and maintain the SFIA Framework for the benefit of all.

SFIA has become the globally accepted common language for the skills and competencies related to information and communication technologies, digital transformation and software engineering.

SFIA remains a collaboration – it has been regularly updated through a global open consultation process. People with real practical experience of developing and managing skills/competencies in corporate, public sector and educational environments from all around the world, contribute to ensuring SFIA remains relevant and true. It is built by industry and business for industry and business.

It is these components that set SFIA apart from other frameworks and has resulted in its adoption by governments, corporates and individuals in almost 200 countries. Its unique and ongoing success can also be attributed to:

  • Built and owned by the global user community
  • Global collaborative development
  • Global governance and steering boards
  • A 20+ year provenance and track record of successful use
  • An established ecosystem and trusted infrastructure
  • A neutral approach – it is not aligned to any specific technologies, vendors or professional bodies
Strategy and Architecture
Information strategy
  • Enterprise IT governance
  • GOVN
  •     7
  • Strategic planning
  • ITSP
  •     7
  • Information governance
  • IRMG
  •    7
  • Information systems coordination
  • ISCO
  •  7
  • Information security
  • SCTY
  •         7
  • Information assurance
  • INAS
  •     7
  • Analytics
  • INAN
  •         7
  • Data visualisation
  • VISL
  •  5  
  • Information content publishing
  • ICPM
  •           6  
Advice and guidance
  • Consultancy
  • CNSL
  •     7
  • Specialist advice
  • TECH
  •     6  
Business strategy and planning
  • Demand management
  • DEMM
  •   6  
  • IT management
  • ITMG
  •     7
  • Financial management
  • FMIT
  •     6  
  • Innovation
  • INOV
  •     7
  • Research
  • RSCH
  •         6  
  • Business process improvement
  • BPRE
  •   6  
  • Knowledge management
  • KNOW
  •         6  
  • Enterprise & Business architecture
  • STPL
  •     7
  • Business risk management
  • BURM
  •    7
  • Sustainability
  • SUST
  •     6  
Technical strategy and planning
  • Emerging technology monitoring
  • EMRG
  •     6  
  • Continuity management
  • COPL
  •   5    
  • Network planning
  • NTPL
  •   6  
  • Solution architecture
  • ARCH
  •     6  
  • Data management
  • DATM
  •         6  
  • Methods and tools
  • METL
  •       6  
CHANGE & TRANSFORMATION
BUSINESS CHANGE IMPLEMENTATION
  • Portfolio management
  • POMG
  •     7
  • Programme management
  • PGMG
  • 6  
  • Project management
  • PRMG
  •    7
  • Portfolio, programme & project support
  • PROF
  •         6  
Business change management
  • Business analysis
  • BUAN
  •       6  
  • Business modelling
  • BSMO
  •         6  
  • Requirements definition, management
  • REQM
  •         6  
  • Organisational capability development
  • OCDV
  •     7
  • Organisation design & implementation
  • ORDI
  •     7
  • Change implementation planning & mgt
  • CIPM
  •   6  
  • Business process testing
  • BPTS
  •     6  
  • Benefits management
  • BENM
  •   6  
DEVELOPMENT AND IMPLEMENTATION
SYSTEMS DEVELOPMENT
  • Systems development management
  • DLMG
  •     7
  • Systems design
  • DESN
  •     6  
  • Software design
  • SWDN
  •         6  
  • Programming / Software development
  • PROG
  •         6  
  • Real-time / Embedded systems devel...
  • RESD
  •         6  
  • Animation development
  • ADEV
  •   4      
  • Data modelling and design
  • DTAN
  •       5    
  • Database design
  • DBDS
  •     5    
  • Network design
  • NTDS
  •   6  
  • Testing
  • TEST
  •           6  
  • Safety engineering
  • SFEN
  •       6  
  • Information content authoring
  • INCA
  •           6  
User experience
  • User research
  • URCH
  •       6  
  • User experience analysis
  • UNAN
  •     5    
  • User experience design
  • HCEV
  •       6  
  • User experience evaluation
  • USEV
  •       5    
Installation and integration
  • Systems Inst / Decom
  • HSIN
  •         5    
  • Porting / Software configuration
  • PORT
  •       6  
  • Hardware design
  • HWDE
  •     6  
DELIVERY AND OPERATION
Service design
  • Availability management
  • AVMT
  •     6  
  • Service level management
  • SLMO
  •       5    
Service transition
  • Service acceptance
  • SEAC
  •     6  
  • Configuration management
  • CFMG
  •         6  
  • Asset management
  • ASMG
  •         6  
  • Change management
  • CHMG
  •         6  
  • Release and deployment
  • RELM
  •       6  
Service operation
  • System software
  • SYSP
  •     5    
  • Capacity management
  • CPMG
  •     6  
  • Security administration
  • SCAD
  •           6  
  • Penetration testing
  • PENT
  •     6  
  • Radio frequency engineering
  • RFEN
  •         6  
  • Application support
  • ASUP
  •       5    
  • IT infrastructure
  • ITOP
  •       4      
  • Database administration
  • DBAD
  •       5    
  • Storage management
  • STMG
  •       6  
  • Network support
  • NTAS
  •       5    
  • Problem management
  • PBMG
  •     5    
  • Incident management
  • USUP
  •       5    
Skills and quality
Skill management
  • Learning & development management
  • ETMG
  •         7
  • Competency assessment
  • LEDA
  •       6  
  • Learning design and development
  • TMCR
  •     5    
  • Learning delivery
  • ETDL
  •     5    
  • Teaching and subject formation
  • TEAC
  • 5    
People management
  • Performance management
  • PEMT
  •     6  
  • Resourcing
  • RESC
  •   5    
  • Professional development
  • PDSV
  •     6  
Quality and conformance
  • Quality management
  • QUMG
  •         7
  • Quality assurance
  • QUAS
  •       6  
  • Measurement
  • MEAS
  •       6  
  • Conformance review
  • CORE
  •       6  
  • Safety assessment
  • SFAS
  •   6  
  • Digital forensics
  • DGFS
  •     6  
Relationships and engagement
Stakeholder management
  • Sourcing
  • SORC
  •         6  
  • Supplier management
  • SUPP
  •         6  
  • Contract management
  • ITCM
  •     6  
  • Relationship management
  • RLMT
  •    7
  • Customer service support
  • CSMG
  •         5    
Sales and marketing
  • Marketing
  • MKTG
  •         6  
  • Selling
  • SALE
  •     6  
  • Sales support
  • SSUP
  •         5    
  • Product management
  • PROD
  •       6  

OTHER INFOTECH EXPERIENCE

Desktop OS Experience

  • Microsoft
MS-DOS 3.2 to Windows 10 (1992-2019)
27yrs 04mths (328mths)
  • BSD
OpenBSD 5.6 to 6.4 (2014-2019)
05yrs 03mths (63mths)
  • Red Hat
Enterprise Linux 3 U1 to 7.6 (2004-2019)
15yrs 04mths (184mths)
  • Acorn
MOS to RISC OS (1982-2005)
09yrs 10mths (118mths)
  • Apple
Mac OS 8.1 to 10.14.2 (1998-2019)
21yrs 04mths (256mths)
  • Oracle
Linux 6 to 7.6 (2014-2019)
05yrs 03mths (63mths)
  • Canonical
Ubuntu 9.04 tp 18.10 (2008-2019)
11yrs 04mths (136mths)
  • Unix
System II to System V R4 (1982-1991)
09yrs 10mths (118mths)

Programming Language Experience

  • PL/SQL
Procedural Language/SQL (2002-2019)
17yrs 04mths (208mths)
  • PASCAL
A high level programming lang (1982-1990)
08yrs 10mths (106mths)
  • COBOL
Common Business-Oriented Lang (1982-1990)
08yrs 10mths (106mths)
  • ALGOL
68 Algorithmic Language 1968 (1982-1985)
03yrs 10mths (46mths)
  • BASIC
Beginner's All-purpose Symb Ins (1982-2005)
23yrs 10mths (286mths)
  • FORTAN
77-90 Formula Translating Sys (1982-1990)
08yrs 10mths (106mths)
  • ADA
Used by US Dept of Defense (1982-1985)
03yrs 10mths (46mths)

Mobile OS Experience

  • iPhone
OS 3.0 to iOS 12.1 (2009-2019)
10yrs 04mths (124mths)
  • Nokia
Series 60 to Nokia Belle (2000-2012)
13yrs 00mths (156mths)
  • Android
Donut 1.6 to Pie 9.0.0 (2009-2019)
09yrs 09mths (117mths)

Database Experience

  • Microsoft
SQL Server 2005 to 2017 (2005-2019)