Professor. Sameera De Alwis
AeroLeads people directory · profile

Professor. Sameera De Alwis Email & Phone Number

Senior Lecturer - Cyber Security at ICBT Campus
Location: Colombo District, Western Province, Sri Lanka 46 work roles 10 schools
LinkedIn matched
3 data sources Profile completeness 86%

Contact Signals

LinkedIn Profile matched
3 free lookups remaining · No credit card
Current company
Role
Senior Lecturer - Cyber Security
Location
Colombo District, Western Province, Sri Lanka
Company size

Who is Professor. Sameera De Alwis? Overview

A concise factual answer block for searchers comparing this professional profile.

Quick answer

Professor. Sameera De Alwis is listed as Senior Lecturer - Cyber Security at ICBT Campus, a company with 691 employees, based in Colombo District, Western Province, Sri Lanka. AeroLeads shows a matched LinkedIn profile for Professor. Sameera De Alwis.

Professor. Sameera De Alwis previously worked as President at Cyber-Intel Online (Pvt) Ltd and Senior Lecturer - Network and Information Security (Kingston University – UK) at Kingston University - Company. Professor. Sameera De Alwis holds Cyber Intelligence And Cyber Security, Cyber/Computer Forensics And Counterterrorism from Mcafee Institute.

Company email context

Email format at ICBT Campus

This section adds company-level context without repeating Professor. Sameera De Alwis's masked contact details.

ICBT Campus

Review company-level records connected to Professor. Sameera De Alwis before choosing the right outreach path.

Profile bio

About Professor. Sameera De Alwis

Greetings and welcome to all of you.I am pleased to introduce myself as a distinguished specialist in cyber security/cyber military intelligence with over 28 years of extensive experience. Throughout my career, I have demonstrated a proven track record of delivering exceptional results within budget constraints. My ability to excel in client interactions underscores my commitment to excellence. These achievements are crucial for businesses navigating today's competitive landscape. With my knowledge, experience, and dedication, I am confident in my ability to help business succeed in this challenging world.I possess a robust foundation in high-tech system exploitation, penetration testing, vulnerability assessments, architecture, and blueprinting. Also, secure military (Mil-Net) and campus network design, ISMS, BCP/DR, perimeter security hardening, and tactical defense. I am skilled in zero-day exploit techniques, team collaboration (red-team/blue-team, purple team, etc.), Assembly Language (x32/x64) and ansi/borland raw C/C++ coding , and reverse engineering for black and white-box testing.Furthermore, I have a wealth of experience and expertise in the field of cybersecurity. My skills include ethical hacking, digital and cyber forensics, system defect analysis, air gap and SCADA penetration testing, as well as exploiting intelligent mobile devices, web, and cloud applications. I have also conducted penetration testing for IoT, SoT, and AoT. In addition, I have a strong background in advanced threat intelligence, adversary simulation, persistent malware mitigation planning, and counter-sophisticated attacks. My diverse skill set and extensive knowledge in cybersecurity make me a valuable asset in ensuring the protection and resilience of critical systems.I am a highly skilled cyber defense contractor, well-equipped to handle your esteemed project. Establishing a strong relationship with clients is crucial to me, as it sets the stage for a prosperous business partnership within the project's framework. I place a high priority on clear/efficient communication to facilitate seamless collaboration and advancement. Throughout the project, I am committed to maintaining transparency, offering a detailed insight into the entire process. I am grateful for your willingness to support an individual who aims to emulate your success. Thank you in advance for considering my candidacy.I deeply yearn for the presence of my dear mother and grandmother, who has departed from this world. May they find ultimate peace and enlightenment in the realm of Nibbana.

Current workplace

Professor. Sameera De Alwis's current company

Company context helps verify the profile and gives searchers a useful next step.

ICBT Campus
Icbt Campus
Senior Lecturer - Cyber Security
Western Province, Sri Lanka
Website
Employees
691
AeroLeads page
46 roles

Professor. Sameera De Alwis work experience

A career timeline built from the work history available for this profile.

Senior Lecturer - Cyber Security

Western Province, Sri Lanka

President

Current

Kiribathgoda, Western, LK

High-Tech System Exploitation/Penetration Testing, Automated/Manual Vulnerability and System Defect Analysis, Device Specific Network and Security Audits (Firewall/IDS/IPS, VPN/HSM, Manhunt/Mantrap, Syslog/Honeypot, Wireless/Router/Switch/NAC Devices, etc.), Smart Systems/Portable or Mobile Device Penetration Testing and Vulnerability Analysis (IoT, AoT.

Nov 2017 - Present

Senior Lecturer - Network And Information Security (Kingston University – Uk)

Current

London, Greater London, GB

Esoft - Kingston University – UKMSc in Network and Information Security (Kingston University – UK) http://www.kingston.ac.uk/postgraduate-course/network-information-security-msc/http://www.esoft.lk/computer-studies/masters-degree-programme/msc-in-network-and-information-security-kingston-university-uk/Core Modules:CI7130- Network and Information.

Jan 2017 - Present

President Of The Board Of Directors

Current

Kelaniya, Western, LK

Cyber-Intel: The Front-Runner in Cyber-Security TrainingThe Cyber-Intel University is the prime and most consistent source for Cyber-Security training, the courses now reach more than 30+ batches around the island. Cyber-Intel is a lawfully incorporated business of Sri Lanka under the Companies Act #7 of 2007 and received the token of PV 127708 and termed.

Nov 2017 - Present

Sigint (Signals Intelligence), Anti-Cyber Terrorism And Cyber-Warfare (Military) Consultant (Ex/In)

Current

Kelaniya, Western, LK

Remote Cyber Command-&-Control and Cyber Defense Independent Research Consulting for Persistent Threats, Resource Doxing Expert and Reconnaissance Researcher allied to SIGINT (Intelligence) Activities. Independent Anti-Cyber Terrorism Expert Advisor and Legal Jurisdiction Research Counselor. Cyber-Warfare Expert Researcher for Advanced Persistent Threats.

May 2017 - Present

Senior Malware Analyst/Reverse Engineering Specialist

Kelaniya, Western, LK

The scope to Reverse Engineering of numerous types malware samples and create anti-malware pattern with the perspective of debugging/disassembling the binary code to disassembly code (low-level static/dynamic code analysis methods)... with the use of NSA Ghidra, X-Rays IDA (Interactive Disassembler) Pro, GNU GDB, Binary Ninja, Olly Debug, Immunity.

May 2020 - Dec 2020

Cryptology Academic Scientist, Cryptographic Lecturer And Researcher

Kelaniya, Western, LK

Researching Grounds....Artificial Intelligence (Virtualized Neural Factor) Based Cryptanalysis TechnologiesDiscreet Cryptography Mathematics and Linear Cryptologic AlgebraManual and Mathematical Reverse Cryptography with FORTRAN, Maple, MathLab, AMPL and Wolfram MathematicaLinear Polygraphic Substitutions in Cryptography and Linear Shift Registers on.

Sep 2018 - Sep 2020

Counter Cyber-Terrorism Specialist/Anti-Hack [Archangel Black Ops] Command Expert [Online]

Kelaniya, Western, LK

[*] Cyber-warfare and Cold-war Strategies for Advanced Nation Security Vector-Grounds[*] Covert-Channel based Cyber-Attacks Countermeasures against Cyber-Terrorism Hacktivism[*] Intel. Squadron Lineup/Team Formation Strategical Plan and Implementation for Cyber-Battles[*] Attack-Forensics and Anti-Forensics on Cyber-Grids and Big-Data Sensitive Mil-Data.

Dec 2017 - Dec 2019

Kernel Exploit, Vulnerability Researcher, And Expert Scientist In Special Military/Defense And Intel

Kelaniya, Western, LK

Northrop Grumman, Lockheed Martin, General Dynamics specific systems and product range for military,defense,cyber,intelligence and tactical warfare systems such as JTAGS,Cyber Mission Platform,The Cyber Edge,C2BMC,M324 UAS,GMD FCC,IBCS,RQ-4 Block 20 Global Hawk,AESA Radars,AN/ZPY-1 STAR,LN-251 Advanced Airborne INS/GPS (EGI),AN/ZPY-5 VADER,MQ-4C.

Aug 2018 - Oct 2019

Top-Secret Independent Cloud Security Consultant And Researcher (Military And Intelligence Division)

Kelaniya, Western, LK

Researches Playground:- Compute/Storage Cloud - Cloud Based Elastic Storage Cryptography Technologies for Military/Intelligence Segment- Mil-CloudStack - Online Software Session Based Security Strategies for Military/Intelligence Classified Cloud Stacks/Pillars- Cloud Hosting - BigData and Smart-Grid Security for Mil-Cloud Stacks

Sep 2017 - Sep 2019

Independent Contractor/Researcher (Device Firmware, Bootloader, Kernel And Device Driver Malware)

Kelaniya, Western, LK

Operating Platforms:- Apple iOS (Mini Mac OS X)- Google Android - Microsoft Windows RT/Mobile- Research Motion BlackBerry RIM 10- Mozilla Firefox OS- Linux Mer Linux (Mer, /Mini, Sailfish and Tizen)- Ubuntu Touch Mobile Linux- Sailfish Mini Linux- Tizen Mobile LinuxMalware Researching Grounds:- Low Level Exploit Codes- Persistent Backdoors- Botnets.

Sep 2014 - Sep 2019

Humint Advisor, Intel Researcher, And Intel Specialist

Kelaniya, Western, LK

Black Psychological Operational Unit (Assigned) Research Areas:- Human Exploitation and Black Psychology - HUMINT (Human Intelligence) and Clandestine Services- Serious Human Mind Manipulation and Penetration- IMINT (Imagery Intelligence) and SVR Civilian OP-Analysis- Reverse Hypnotism and Espionage Counterparting - Interpersonal Contact Exploitation.

Jul 2017 - Jul 2019

Contributing Author (The Only Sri Lankan Computer Forensics Author For The Eforensics Magazine)

Current

Warsaw, Mazovian Voivodeship, PL

eForensics Magazine is a community-oriented magazine. It is for digital forensics specialists and enthusiasts to work together and create a magazine of the best quality, attractive to every individual and enterprise interested in the electronic forensics field.MY ARTICLE ON THIS MAGAZINE: - Download 9.6 Mega.

Aug 2013 - Present

Senior Manager (Head Of The Department Of Sit (Sumathi It)) - Cyber Security

Colombo, Western, LK

Product Specific Network and Cyber Security Considerations (Cisco, Microsoft, Linux/UNIX, Android, Solaris, IRIX, iOS, IOS, and MacOSX), High-Performance Cyber-Security and Managed Cyber Security Services and Solutions, ISMS and Compliance InfoSec Audits (ISO, GDPR, DISA, PCI-DSS, NIST, FIPS, OWASP, SANS, SafeTAG, Security on TOGAF, and DoD 8570.01-M.

Sep 2020 - Oct 2021

President/Founder

Project "80[S] It Back To The Future" (The Only "Virtualized Retro Hardware And Software Museum")

OVERVIEW: (Pacific's only Virtualized Retro Hardware and Software Museum)The sole objective is to formulate the Project "80[s] IT BACK TO THE FUTURE" is to fetch back every retro (vintage) computer technology (old-school) to the present-day or to the future. This is an utterly problematic mission due the absence of resources and nonexistence of the.

May 2015 - Oct 2021

Senior Principal Consultant - Cyber Security And Cyber Intelligence

Colombo 03, Western, LK

High-Tech System Exploitation/Penetration Testing, Automated/Manual Vulnerability and System Defect Analysis, Device Specific Network and Security Audits (Firewall/IDS/IPS, VPN/HSM, Manhunt/Mantrap, Syslog/Honeypot, Wireless/Router/Switch/NAC Devices, etc.), Smart Systems/Portable or Mobile Device Penetration Testing and Vulnerability Analysis (IoT, AoT.

Aug 2019 - Aug 2020

Head Of Operations - Cyber Security And Cyber Intelligence

Colombo 03, Western, LK

Product Specific Network and Cyber Security Considerations (Cisco, Microsoft, Linux/UNIX, Android, Solaris, IRIX, iOS, IOS, and MacOSX), High-Performance Cyber-Security and Managed Cyber Security Services and Solutions, ISMS and Compliance InfoSec Audits (ISO, GDPR, DISA, PCI-DSS, NIST, FIPS, OWASP, SANS, SafeTAG, Security on TOGAF, and DoD 8570.01-M.

Jan 2019 - Aug 2019

Senior Lecturer - Computer Systems And Networking (Greenwich University – Uk)

Greenwich, London, GB

PIBT - Greenwich University – UKBSc (Hons) Computer Systems and Networking (Greenwich University – UK) https://www.gre.ac.uk/ug/ach/g404http://www.pibtsl.com/bsc-hons-computer-systems-networking/http://www.pibtsl.com/wp-content/uploads/2015/02/BSc-Hons-Computer-Systems-Networking.pdfThe BSc (Hons) Computer Systems & Networking is designed for individuals.

Feb 2018 - Oct 2019

Lead Advisor, Lead Computer/Cyber/Net Forensics Investigator [High-Tech Crime Investigation Unit]

Tel-Aviv, Gush Dan, IL

INVESTIGATION ARENAS:- Social Media (Facebook, LinkedIn, Google+) & Social Network- Search Engine/SEO Bot, Leecher/Tracker (Torrent), Spidering & Crawler - Cloud & Virtualization (Hyper-V, VMWare, VirtualBox etc)- e-Commerce, m-Commerce, e-Money & Bitcoin- Botnet, Darknet, DDoS & APT- Protocol & Kernel Forensics- Anonymizer Forensics (TOR, VPN, HIDE IP.

Sep 2014 - Sep 2019

Ceo/Info-Sec Consultant, Researcher/Scientist, Legal Advisory, Computer/Cyber Forensics Investigator

Tel-Aviv, Gush Dan, IL

Reverse Code Engineering encompasses Multi-platform Assembly Language Development, Software Security Concepts and Solutions, Software Core Architecting, Web Technology security, Operating System Reverse Engineering, Shell Scripting, Programming Language Compilers Researching and Reversing, Emulation Design for Multiplatform, Computer Viruses, Worms.

Dec 2010 - Sep 2019

Independent Digital Forensics Technology Consultant/Legal Advisor

Tel-Aviv, Gush Dan, IL

Exclusive Consultancy Pitches: - Highest Gauge Computer and Cyber Forensics- Extreme Malware Forensics and High-Tech Crime Investigations- Modern Cyber Threat and Persistent Malware Threat Forensics- Cyber-Warfare/Cold-War Impact Mitigation and Normalizing Tactical Forensics- Extreme Digital Device Forensics- Legal Jurisdictions on Cyber/Digital and.

May 2015 - Dec 2018

Penetration Tester (Scada Platforms (Siemens), Enterprise Level Erp(S) - (Sap/Microsoft Dynamics))

Tel-Aviv, Gush Dan, IL

Started Vulnerability Research and Enterprise Penetration Testing on subsequent Enterprise Systems,Key References,SCADAhttp://en.wikipedia.org/wiki/SCADASiemens SCADA - http://www.automation.siemens.com/mcms/human-machine-interface/en/visualization-software/scada/pages/default.aspxOther SCADA.

Jun 2014 - Dec 2018

Independent Researcher (Icap Integration To Cisco Subsystem/Core Architecture) For Perimeter Defense

Tel-Aviv, Gush Dan, IL

References and Introduction,http://en.wikipedia.org/wiki/Internet_Content_Adaptation_ProtocolIn my research, I am focusing on implementation of Cyber-Traps (Custom Coded), Ingress-Egress Filtering (Firewalls), Anti-Malware, Manhunt and Mantraps (IDS(s)/Honeypots) and Decoy/Lure Environments at the Edge Router Level.Research Paper Available Soon

May 2014 - Dec 2018

Digital Defense And Info-Sec Contractor, Consultant And Senior Lecturer

Tel-Aviv, Gush Dan, IL

Smart Power-Grid and Siemens SCADA Platform Security, Nuclear Fusion Reactors (Digital Security) and Lecturer (Extreme Custom made Exploits Development, Vulnerability Discovery, Code Analysis, Advanced Malware Techniques and Remote/Local Arbitrary Command Execution on numerous segments of the Network/Internetwork Devices (Heap, Stack and Buffer.

Sep 2011 - Dec 2018

Ceo/Snr. Info-Sec Consultant, Legal Advisory, Computer/Cyber Forensics Investigator

Tel-Aviv, Gush Dan, IL

My proficiency contextual encompasses with Information security management, Security Policy development and implementation, Business Continuity (BCP) and Disaster Recovery (DRP) planning, Intrusion Detection/Prevention engineering and implementation, Perimeter Security Device administration consulting and training, Incident handling and reporting.

Jan 2010 - Dec 2018

Independent Senior Consultant/Advisor For Foreign Intelligence And Counterintelligence Surveillance

Tel-Aviv, Gush Dan, IL

Independent Consultant/Advisor for Foreign Intelligence/Counterintelligence Surveillance (Judicial Electronic Interceptions/Espionage) Mass Surveillance of Global Intelligence Community (GIC)Expertise in USA/UK-Europe Governing Intelligence Acts: - Foreign Intelligence Surveillance Act (FISA)- FISA Amendments Act (FAA) - Foreign Intelligence Surveillance.

Mar 2016 - Oct 2018

Independent Researcher (Cisco Sinkhole Router For Malware Mitigation - Blackhole Filter) For Isp-Sec

Tel-Aviv, Gush Dan, IL

References and Introduction,http://en.citizendium.org/wiki/Sinkhole_(Computer_network)http://www.cisco.com/web/about/security/intelligence/worm-mitigation-whitepaper.htmlResearch Paper Available Soon

Apr 2014 - Oct 2018

Blackhat Seo (Search Engine Optimization) Tech-Lead And Scientist

Tel-Aviv, Gush Dan, IL

Low-Level, Hostile and Potent Search Engine BOT Hacking Tactics, Tactical Search Engine Optimization Architectural Attacks to Core Search Engine BOT(s), Hacking Mass Search Engine BOT(s) such as Google Web Crawler BOT and Bing Leecher BOT,.HTACCESS Search Engine BOT Manipulation, ROBOT.TXT Based Search Engine BOT Hacking, Forceful HTML Meta-Tag Injections.

May 2014 - Aug 2018

Senior Lecturer (Computer Low-Level Programming And System Low Level Coding)

Tel-Aviv, Gush Dan, IL

Unix 32/64 bits (x86-x64) Assembly Language - Workstation/ServerLinux 32/64 bits (x86-x64) Assembly Language - Workstation/ServerMicrosoft Windows 32/64 bits (x86-x64) Assembly Language - Workstation/Server Sun Solaris 64 bits (x64) Assembly Language - ServerApple MacOSX 32/64 bits (x86-x64) Assembly Language - Workstation/ServerGoogle Android 32 bits.

Jan 2010 - Feb 2016

Senior Lecturer And Senior Education Consultant (Cyber/Computer Security And Digital Forensics)

Tel-Aviv, Gush Dan, IL

Trained officials (Solicitors/Lawyers) from Courts of Sri Lanka for Digital (Computer/Cyber Forensics) Investigations, Cyber/Computer and Information Security - Official training program and course conducted by University of Colombo and AIMS College International - Colombo.

Jan 2013 - Nov 2014

Independent Researcher (Darknet(S), Apt(S) (Advanced Persistent Threat) Clusters And Ai Botnet(S))

Tel-Aviv, Gush Dan, IL

I was authoritatively consigned to ensue through the research segment of subsequent Attack Vectors,1). DarkNet(s)-(File Sharing) - http://en.wikipedia.org/wiki/Darknet_(file_sharing)2). APT(s) - http://en.wikipedia.org/wiki/Advanced_persistent_threat3). BotNet - http://en.wikipedia.org/wiki/Botnet

May 2014 - Oct 2014

President/Ceo, And Founder

Negombo, Western, LK

[Welcome to HI-Cyber Campus Online ("GET CERTIFIED FROM THE QUALIFIED"​)] - The Only Fully Virtualized Cloud Based Campus in Pacific Cyberspace (Proudly from Motherland Sri Lanka - Host Power from Israel) - Powered with Ultimate Cisco and BlackBerry Enterprise Cloud based fully Virtualized Facilities. We initiated our premier grade of fully online.

Aug 2015 - Aug 2019

President/Private Detective/Special Agent: Cid [High-Tech Crime Investigation Division/Intelligence]

- Lawful Interception Device Hardware/Software- Corporate/Private Professional Detective Services- Digital Financial, Bank, & Insurance Crimes/Frauds- Spy Products & DRM Solutions- Pre/Post Employee Verification Services- Record Search & Verifications Services- Missing Person Detective Services- 419 Email Related Frauds/Scams (Ex. Nigerian)- Patent.

Aug 2015 - Aug 2019

Founder

Colombo, Western, LK

I am the initiator and the founder of DEFCON [Sri Lanka] (The Largest Hacking Conference) and we are the registered (official) DEFCON initiative in Sri Lanka under the worldwide channel of DEFCON (DEF CON Communications, Inc - https://www.defcon.org/ and received the ID of DC9411 - Sri Lanka),[https://www.defcongroups.org/dcpages-int.html] This mammoth.

Apr 2018 - Apr 2019

Senior Lecturer, Senior Information Security Consultant And Computer/Cyber Forensics Advisor

Criminal Investigation Departments - Cyber-Crime And Digital-Crime Investigation Units (Police)

I am one of the prominent educational consultant and advisor for Ethical Hacking, Cyber Security, Computer Security, Computer Forensics, Cyber Forensics and Digital Forensics for global forum of department of criminal investigations in the police departments (world-wide). I am rendering my services (opinion councilling and specific digital forensic cases.

Aug 2013 - Aug 2018

Senior Lecturer - Cloud Security And Network Security

London, GB

Esoft - London Metropolitan UniversityBEng (Hons) in Computer Networking Top-Up (London Met – UK) https://www.esoft.lk/computer-studies/top-up-degree-programmes/beng-hons-top-up-computer-networking-london-met-uk/CC6004 – Network and Cloud SecurityFC6P01 – Project

Mar 2016 - Mar 2018

Senior Lecturer - Cisco Network Security (Ccna Security Academic Curriculum)

London, GB

Esoft - London Metropolitan UniversityBEng (Hons) in Computer Networking Top-Up (London Met – UK) https://www.esoft.lk/computer-studies/top-up-degree-programmes/beng-hons-top-up-computer-networking-london-met-uk/CT6004 – Network Security(Cisco)FC6P01 – Project

Mar 2016 - Mar 2018

Senior Lecturer - Computer Security (De Montfort University (Dmu), Leicester, Uk)

Leicester, GB

Auston - De Montfort University (DMU), Leicester, UKhttp://dmu.ac.uk/study/courses/undergraduate-courses/computer-security-bsc-degree/computer-security-bsc-hons-degree.aspxhttps://auston.edu.lk/bachelors-degee-science-computer-security/System Defence Strategies:Topics to be considered include Incident Response and Penetration Testing, considered to be key.

Sep 2017 - Jan 2018

Senior Lecturer - Computer Network Security (Birmingham City University – Uk)

Birmingham, England, GB

Auston - Birmingham City University – UKBSc in Computer Network Security (Birmingham City University – UK) http://www.bcu.ac.uk/courses/computer-networks-and-security-bsc-hons-msci-2017-18https://auston.edu.lk/bachelor-of-science-computer-network-security/Core Modules:- Peresonal Identification and Authentication Systems- Individual Project

Mar 2017 - Jan 2018

Senior Lecturer And Senior Education Consultant (Cyber/Computer Security And Digital Forensics)

Sri Lanka Police And Cid (Criminal Investigation Department) Sri Lanka

Trained officials from Sri Lanka Department of Police and CID Sri Lanka for Digital (Computer/Cyber Forensics) Investigations, Cyber/Computer and Information Security - Official training program and course conducted by University of Colombo.

Oct 2013 - Oct 2014

Head Of Information Security And Group Information Security Consultant

The Capital Maharaja Organization Limited (Group Of Companies)

Perimeter Security Architecting/Implementation of The Intranet/Extranet, High-Tech Digital Defense and Cyber Security Tactical Planning and Implementation, Digital Mass Media Security for Media Base-Stations, Data Loss Prevention of The Company's Critical Assets, Internal/Corporate Legal Prosecutions for Digital Policy/Procedure Violations.

Jan 2007 - Nov 2009

Sl-Cert|Cc - Founder Member And Senior Information Security Consultant

Bauddhaloka Mawatha, Colombo 07, LK

Engaged as a Founder Member, Senior Information Security and Computer/Cyber Forensics Consultant and Trainer of Sri Lanka CERT|CC (Computer Emergency Readiness Team|Coordination Center). Exertions which was carried out throughout the period of engagement,- Setting-up the High Performance Internal Network Infrastructure (LAN/WAN and INTERNET) of CERT|CC.

Jul 2005 - Aug 2008

Senior Systems Auditor, Penetration Tester And Senior Information Security Consultant

Colombo 03, LK

Engaged as a Senior Information Security Consultant and Senior Systems Auditor of ICTA Sri Lanka (Information and Communication Technology Agency of Sri Lanka). Exertions which was carried out throughout the period of engagement,- Conducted the Deep Internal Systems Audit of ICTA - Conducted the Comprehensive Range of Deep System Vulnerability Assessment.

Aug 2005 - Mar 2008

Information Security And Reverse Engineering Consultant

Cnt - Ceylinco Network Technologies

Business and Technical Continuity Planning and Disaster Recovery, High-Tech Digital Defense and Cyber Security Strategic Forecasting and Implementation, Perimeter Security Architecting/Implementation of The Intranet/Extranet, Corporate and Business Computer/Digital Criminal Legal Advisory for The Internal Legal Department, Secure the Top-Tier Board's.

Jan 2003 - Dec 2006

Information Security Specialist

Etpl (Enterprise Technology Private Limited) - A Member Of Bartleet Group Of Companies

High-Performance Networking with Corporate System Integration, High-Tech Researches for New-Breed Technologies, Remediation and Consultation for the Top-Tier Management, Data Loss Prevention of The Company's Critical Assets, Business and Technical Continuity Planning and Disaster Recovery, Cyber Security and Allied Supplementary Security Related Issues.

Jan 2001 - Nov 2003
10 education records

Professor. Sameera De Alwis education

Cyber Intelligence And Cyber Security, Cyber/Computer Forensics And Counterterrorism

Mcafee Institute

Post Doctoral Research Student, It And Information Security

Aldersgate College

Dba - Doctor Of Business Administration, It, Information Security (Project Ravana)

Aldersgate College

Interim Crash Courses, Backup/Disaster Recovery, Firewall, Utm And Supplementary Perimeter Defense

Specialized Task Oriented Product Vendors

Interim Crash Courses, Firewall, Utm And Supplementary Perimeter Defense

Specialized Task Oriented Product Vendors

Interim Crash Courses, Generic Security, Anti-Malware, Noc/Soc Solutions And Hsm Solutions

Specialized Task Oriented Product Vendors

Interim Crash Courses, Generic Information Security And Perimeter Defense

Specialized Task Oriented Product Vendors

Interim Crash Courses, High Performance Networking/Os And Clustering, Mobile/Wireless Engineering And Telecommunication

Specialized Task Oriented Product Vendors

Dcsd, Computer Science

Nibm - National Institute Of Business Management

Foundation Degree, Agriculture, Agriculture Operations, And Related Sciences

Gurukula College - Kelaniya - Sri Lanka
FAQ

Frequently asked questions about Professor. Sameera De Alwis

Quick answers generated from the profile data available on this page.

What company does Professor. Sameera De Alwis work for?

Professor. Sameera De Alwis works for ICBT Campus.

What is Professor. Sameera De Alwis's role at ICBT Campus?

Professor. Sameera De Alwis is listed as Senior Lecturer - Cyber Security at ICBT Campus.

Where is Professor. Sameera De Alwis based?

Professor. Sameera De Alwis is based in Colombo District, Western Province, Sri Lanka while working with ICBT Campus.

What companies has Professor. Sameera De Alwis worked for?

Professor. Sameera De Alwis has worked for Icbt Campus, Cyber-Intel Online (Pvt) Ltd, Kingston University - Company, Cyber-Intel University (Online), and Eforensics Magazine.

How can I contact Professor. Sameera De Alwis?

You can use AeroLeads to view verified contact signals for Professor. Sameera De Alwis at ICBT Campus, including work email, phone, and LinkedIn data when available.

What schools did Professor. Sameera De Alwis attend?

Professor. Sameera De Alwis holds Cyber Intelligence And Cyber Security, Cyber/Computer Forensics And Counterterrorism from Mcafee Institute.

Find 750M verified contacts

Search by job title, company, industry, location, and seniority. Export verified B2B contact data when you need it.