JOSEPH S R DE SARAM
Computer Scientist / Human Rights Activist
Архитектор информационной безопасности
مهندس أمن المعلومات
Click the logo or scroll to get started
with Expertise in the Field of
Information Security Architecture.
the Conceptualisation and Design of
Wide Area Distributed Systems
Advanced Neural Networks
and Strong Cryptographics.
Clients comprise those from
Aerospace & Defence
and Banking & Securities.
Click the logo or scroll to get started

ABOUT JOE

A Human Rights Activist with expansive conceptual abilities in Information Security.

Joseph S R de Saram has expertise in the fields of Information Security Architecture, Intelligence Analysis and Digital Forensics. Areas of specialisation include the conceptualisation and design of wide area distributed systems, advanced neural networks, and strong cryptographics. Proven thought leadership, business development and technical mindset have evolved over thirty years. Competent hard-working and focussed, Joseph is able to optimise and greatly enhance existing methodologies by extremely rapid assimilation of new material and modification of structured procedures.

Joseph achieves organisational competency through enforcing tough deadlines and rationalisation, and motivating co-workers to optimum efficiency. Furthermore Joseph’s successful implementation of complex projects from concept to delivery in terms of confidentiality, integrity and availability lead to significant improvement in the quality and performance of complex software algorithms.

HUMAN RIGHTS

Joseph de Saram has always promoted and campaigned for the the Fundamental Human Rights and freedoms that humans are entitled to. A human rights activist typically brings out the various human rights violations in the public domain and campaigns to restore these rights. Since the late 1990s my focus has been cryptographic projects involving:-
Article 12
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.
Article 19
Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
After the [Political] Psychiatric Fraud of 2015, Joseph truly understood the significance of:-
Article 3
Everyone has the right to life, liberty and security of person.
Article 5
No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment.
Article 8
Everyone has the right to an effective remedy by the competent national tribunals for acts violating the fundamental rights granted him by the constitution or by law.
Article 9
No one shall be subjected to arbitrary arrest, detention or exile.

INFORMATION SECURITY

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Maecenas rutrum, odio in congue facilisis, felis massa imperdiet dui, a aliquet tellus nibh sit amet lectus. Suspendisse leo est, pellentesque eget elementum ut, commodo lobortis orci. Mauris sagittis egestas nunc ut interdum. Morbi egestas, ante quis luctus eleifend, nisi tortor imperdiet urna, sed scelerisque enim nisi quis ipsum. Maecenas non tellus sit amet ante viverra auctor a ut sem. Suspendisse finibus egestas mauris, vitae posuere felis facilisis sed. Nam interdum bibendum arcu, eu tempor eros tincidunt sed. Praesent a ultricies sapien. Suspendisse efficitur, tortor in porttitor volutpat, dolor purus rhoncus justo, at vehicula orci ante vitae erat. Integer et tellus faucibus, cursus nunc in, mollis nibh. Nunc ut nulla a leo imperdiet lacinia in non metus. Duis imperdiet, velit eget aliquet dignissim, nibh enim condimentum eros, quis commodo nunc ipsum sit amet risus. Etiam finibus, orci sit amet aliquet maximus, elit ex pretium enim, in scelerisque neque sapien sit amet massa. Duis quis magna a orci volutpat ornare sit amet quis massa. Proin at nisl ac tortor auctor iaculis.

Donec euismod quam sit amet diam imperdiet, vitae egestas eros hendrerit. Integer ullamcorper massa nisi, sed efficitur nibh pulvinar non. Nam a molestie ipsum. Pellentesque ac augue felis. Nulla nulla lectus, bibendum ut mi non, iaculis consectetur neque. Nulla facilisi. Ut turpis justo, ornare vel consequat ut, elementum non neque. Nullam laoreet tristique tortor, at consequat lacus tincidunt vel. Fusce felis purus, elementum vitae libero in, ultricies ultricies massa.

INFOSEC EXPERIENCE

  • Applied Cryptographics (1993-2018)
99%
24yrs 8mths (288mths)
  • Telecommunications and Network Security (1993-2018)
99%
24yrs 8mths (288mths)
  • Operations Security (1993-2018)
99%
24yrs 8mths (288mths)
  • Hybrid and Emerging Technology (1993-2018)
98%
24yrs 7mths (288mths)
  • Security Leadership and Management (1993-2018)
97.6%
24yrs 6mths (288mths)
  • Information Security Governance and Risk (1995-2018)
92%
22yrs 9mths (264mths)
  • Forensic Science, Investigations and Techniques (1996-2018)
88%
22yrs 0mths (264mths)
  • System Security Engineering (1997-2018)
79%
21yrs 2mths (252mths)
  • Software Development Security (1998-2018)
79.9%
20yrs 1mths (240mths)
  • Requirements Analysis and Security Standards (1998-2018)
78%
20yrs 1mths (240mths)
  • Physical Security Integration (1998-2018)
76%
19yrs 9mths (228mths)
  • Security Lifecycle Management (1998-2018)
75.6%
19yrs 7mths (228mths)
  • Certification and Accreditation / Risk Management (1998-2018)
75.6%
19yrs 4mths (228mths)
  • Security Architecture Analysis and Design (1999-2018)
73.8%
19yrs 2mths (228mths)
  • Enterprise-Wide System Development Security (1999-2018)
73.8%
19yrs 2mths (228mths)
  • Enterprise Security Management Practices (1999-2018)
73%
18yrs 9mths (216mths)
  • Access Control Systems and Methodology (1999-2018)
71%
18yrs 7mths (216mths)
  • Government Information Security Assurance (1999-2018)
69%
18yrs 2mths (216mths)
  • Business Continuity Planning and Disaster Recovery (2000-2018)
69%
18yrs 9mths (216mths)
  • Legal, Regulations, Investigation and Compliance (2000-2018)
69%
17yrs 10mths (204mths)

Applied Cryptography

Forensics & Law Enforcement

Distributed Architectures

Multidimensional Obfuscation

Operations Security

Advanced Neural Networks

Computational Infeasibility

INFORMATION TECHNOLOGY (SFIA 7)

SFIA describes skills and competencies required by professionals in roles involved in information and communication technologies, digital transformation and software engineering.

SFIA was formally launched in 2000 and its provenance can be traced back to the 1980s and a number of collaborative skills and competency projects. These led to the SFIA Framework and the formation of the SFIA Foundation which has become an international not-for-profit organisation that now brings together the global community to develop and maintain the SFIA Framework for the benefit of all.

SFIA has become the globally accepted common language for the skills and competencies related to information and communication technologies, digital transformation and software engineering.

SFIA remains a collaboration – it has been regularly updated through a global open consultation process. People with real practical experience of developing and managing skills/competencies in corporate, public sector and educational environments from all around the world, contribute to ensuring SFIA remains relevant and true. It is built by industry and business for industry and business.

It is these components that set SFIA apart from other frameworks and has resulted in its adoption by governments, corporates and individuals in almost 200 countries. Its unique and ongoing success can also be attributed to:

  • Built and owned by the global user community
  • Global collaborative development
  • Global governance and steering boards
  • A 20+ year provenance and track record of successful use
  • An established ecosystem and trusted infrastructure
  • A neutral approach – it is not aligned to any specific technologies, vendors or professional bodies
Strategy and Architecture
Information strategy
  • Enterprise IT governance
  • GOVN
  • 5 6 7
  • Strategic planning
  • ITSP
  • 5 6 7
  • Information governance
  • IRMG
  • 4 5 6 7
  • Information systems coordination
  • ISCO
  • 6 7
  • Information security
  • SCTY
  • 3 4 5 6 7
  • Information assurance
  • INAS
  • 5 6 7
  • Analytics
  • INAN
  • 3 4 5 6 7
  • Data visualisation
  • VISL
  • 4 5    
  • Information content publishing
  • ICPM
  • 1 2 3 4 5 6  
Advice and guidance
  • Consultancy
  • CNSL
  • 5 6 7
  • Specialist advice
  • TECH
  • 4 5 6  
Business strategy and planning
  • Demand management
  • DEMM
  • 5 6  
  • IT management
  • ITMG
  • 5 6 7
  • Financial management
  • FMIT
  • 4 5 6  
  • Innovation
  • INOV
  • 5 6 7
  • Research
  • RSCH
  • 2 3 4 5 6  
  • Business process improvement
  • BPRE
  • 5 6 7
  • Knowledge management
  • KNOW
  • 2 3 4 5 6 7
  • Enterprise and business architecture
  • STPL
  • 5 6 7
  • Business risk management
  • BURM
  • 4 5 6 7
  • Sustainability
  • SUST
  • 4 5 6  
Technical strategy and planning
  • Emerging technology monitoring
  • EMRG
  • 4 5 6  
  • Continuity management
  • COPL
  • 4 5    
  • Network planning
  • NTPL
  • 5 6  
  • Solution architecture
  • ARCH
  • 4 5 6  
  • Data management
  • DATM
  • 2 3 4 5 6  
  • Methods and tools
  • METL
  • 3 4 5 6  
CHANGE & TRANSFORMATION
BUSINESS CHANGE IMPLEMENTATION
  • Portfolio management
  • POMG
  • 5 6 7
  • Programme management
  • PGMG
  • 6 7
  • Project management
  • PRMG
  • 4 5 6 7
  • Portfolio, programme and project support
  • PROF
  • 2 3 4 5 6  
Business change management
  • Business analysis
  • BUAN
  • 3 4 5 6  
  • Business modelling
  • BSMO
  • 2 3 4 5 6  
  • Requirements definition and management
  • REQM
  • 2 3 4 5 6  
  • Organisational capability development
  • OCDV
  • 5 6 7
  • Organisation design and implementation
  • ORDI
  • 5 6 7
  • Change implementation planning and management
  • CIPM
  • 5 6  
  • Business process testing
  • BPTS
  • 4 5 6  
  • Benefits management
  • BENM
  • 5 6  
DEVELOPMENT AND IMPLEMENTATION
SYSTEMS DEVELOPMENT
  • Systems development management
  • DLMG
  • 5 6 7
  • Systems design
  • DESN
  • 4 5 6  
  • Software design
  • SWDN
  • 2 3 4 5 6  
  • Programming/software development
  • PROG
  • 2 3 4 5 6  
  • Real-time/embedded systems development
  • RESD
  • 2 3 4 5 6  
  • Animation development
  • ADEV
  • 3 4 5 6  
  • Data modelling and design
  • DTAN
  • 2 3 4 5    
  • Database design
  • DBDS
  • 3 4 5    
  • Network design
  • NTDS
  • 5 6  
  • Testing
  • TEST
  • 1 2 3 4 5 6  
  • Safety engineering
  • SFEN
  • 3 4 5 6  
  • Information content authoring
  • INCA
  • 1 2 3 4 5 6  
User experience
  • User research
  • URCH
  • 3 4 5 6  
  • User experience analysis
  • UNAN
  • 3 4 5    
  • User experience design
  • HCEV
  • 3 4 5 6  
  • User experience evaluation
  • USEV
  • 2 3 4 5 6  
Installation and integration
  • Systems integration and build
  • SINT
  • 2 3 4 5 6  
  • Porting/software configuration
  • PORT
  • 3 4 5 6  
  • Hardware design
  • HWDE
  • 4 5 6  
  • Systems installation/decommissioning
  • HSIN
  • 1 2 3 4 5    
DELIVERY AND OPERATION
Service design
  • Availability management
  • AVMT
  • 4 5 6  
  • Service level management
  • SLMO
  • 2 3 4 5 6 7
Service transition
  • Service acceptance
  • SEAC
  • 4 5 6  
  • Configuration management
  • CFMG
  • 2 3 4 5 6 7
  • Asset management
  • ASMG
  • 4 5 6  
  • Change management
  • CHMG
  • 2 3 4 5 6  
  • Release and deployment
  • RELM
  • 3 4 5    
Service operation
  • System software
  • SYSP
  • 3 4 5    
  • Capacity management
  • CPMG
  • 4 5 6  
  • Security administration
  • SCAD
  • 1 2 3 4 5 6  
  • Penetration testing
  • PENT
  • 4 5 6  
  • Radio frequency engineering
  • RFEN
  • 2 3 4 5 6  
  • Application support
  • ASUP
  • 2 3 4 5    
  • IT infrastructure
  • ITOP
  • 1 2 3 4      
  • Database administration
  • DBAD
  • 2 3 4 5    
  • Storage management
  • STMG
  • 3 4 5 6  
  • Network support
  • NTAS
  • 2 3 4 5    
  • Problem management
  • PBMG
  • 3 4 5    
  • Incident management
  • USUP
  • 2 3 4 5    
  • Facilities management
  • DCMA
  • 3 4 5 6  
Skills and quality
Skill management
  • Learning and development management
  • ETMG
  • 3 4 5 6 7
  • Competency assessment
  • LEDA
  • 3 4 5 6  
  • Learning design and development
  • TMCR
  • 3 4 5    
  • Learning delivery
  • ETDL
  • 3 4 5    
  • Teaching and subject formation
  • TEAC
  • 5 6  
People management
  • Performance management
  • PEMT
  • 4 5 6  
  • Resourcing
  • RESC
  • 4 5 6  
  • Professional development
  • PDSV
  • 4 5 6  
Quality and conformance
  • Quality management
  • QUMG
  • 3 4 5 6 7
  • Quality assurance
  • QUAS
  • 3 4 5 6  
  • Measurement
  • MEAS
  • 3 4 5 6  
  • Conformance review
  • CORE
  • 3 4 5 6  
  • Safety assessment
  • SFAS
  • 5 6  
  • Digital forensics
  • DGFS
  • 4 5 6  
Relationships and engagement
Stakeholder management
  • Sourcing
  • SORC
  • 2 3 4 5 6 7
  • Supplier management
  • SUPP
  • 2 3 4 5 6 7
  • Contract management
  • ITCM
  • 4 5 6  
  • Relationship management
  • RLMT
  • 4 5 6 7
  • Customer service support
  • CSMG
  • 1 2 3 4 5 6  
Sales and marketing
  • Marketing
  • MKTG
  • 2 3 4 5 6  
  • Selling
  • SUPP
  • 4 5 6  
  • Sales support
  • SSUP
  • 1 2 3 4 5 6  
  • Product management
  • PROD
  • 3 4 5 6  
OPERATING SYSTEMS EXPERIENCE
  • Microsoft
Windows 10 to MS-DOS 3.2 (1992-2018)
  • BSD
OpenBSD 5.6 to 6.0 (2014-2018)
  • Red Hat
Enterprise Linux (2004-2018)
  • Unix
System III to System V R4 (1982-1991)
  • Oracle
Linux 6 to 7.3 (2014-2018)
  • Apple
Mac OS 8.1 to 10.12.2 (1981-2018)
  • Canonical
Ubuntu 9.04 (2008-2010)
  • Acorn
MOS to RISC OS (1982-2005)
PROGRAMMING LANGUAGE EXPERIENCE
  • PL/SQL
[Procedural Language/Structured Query Language] (2002-2018)
  • PASCAL
[a high level programming language] (1982-1990)
  • COBOL
[Common Business-Oriented language] (1982-1990)
  • ALGOL
68 [Algorithmic Language 1968] (1982-1985)
  • BASIC
[Beginner’s All-purpose Symbolic Instruction Code] (1982-2005)
  • FORTRAN
Ubuntu 9.04 (2008-2010)
  • ADA
[used by United States Department of Defense] (1982-1985)
MOBILE OS EXPERIENCE
  • iPhone
OS 3.0 to iOS 9.2.1 (2009-2018)
  • Nokia
Series 60 (2000-2012)
  • Android
Donut 1.6 to Nougat 7.1 (2009-2018)
ENTERPRISE RESOURCE PLANNING
  • SAP R/3 and R/3 Enterprise
Release 3.0F-4.6C (1997-2010), Release 4.70 (2002-2010)
  • mySAP Customer RM
CRM 3.0/3.1/4.0 (2002-2005)
  • mySAP Supply Chain Management
APO 3.1 (2002-2005), SCM 4.0/4.1 (2004-2005)
  • mySAP Business Intelligence
BW 2.0B/2.1C/3.0A/3.0B (2000-2005)
  • mySAP Financials
SEM-BW 3.1B-3.50 (2002-2005), SEM-BCS 3.1B-3.50 (2002-2005)
DATABASE EXPERIENCE
  • Microsoft
SQL Server 2005 to 2016 (2005-2018)
  • ORACLE
Oracle 12c to 6i (1999-2018)
  • MYSQL
MySQL Classic (2004-2018)

RESOURCE MATERIALS

20180305

Thank you for visiting today – we are just working on some updates.

CONTACT

If you have a project you would like to discuss, please get in touch with us.

As a Human Rights Activist, projects relating to Articles 5, 10, 12 and 19 are of
particular interest.

JOSEPH S R DE SARAM +807 1742 5273

© 1998 - 2018 JOSEPH S R DE SARAM 10301561