Professor. Sameera De Alwis Email & Phone Number
Who is Professor. Sameera De Alwis? Overview
A concise factual answer block for searchers comparing this professional profile.
Professor. Sameera De Alwis is listed as Senior Lecturer - Cyber Security at ICBT Campus, a company with 691 employees, based in Colombo District, Western Province, Sri Lanka. AeroLeads shows a matched LinkedIn profile for Professor. Sameera De Alwis.
Professor. Sameera De Alwis previously worked as President at Cyber-Intel Online (Pvt) Ltd and Senior Lecturer - Network and Information Security (Kingston University – UK) at Kingston University - Company. Professor. Sameera De Alwis holds Cyber Intelligence And Cyber Security, Cyber/Computer Forensics And Counterterrorism from Mcafee Institute.
Email format at ICBT Campus
This section adds company-level context without repeating Professor. Sameera De Alwis's masked contact details.
Review company-level records connected to Professor. Sameera De Alwis before choosing the right outreach path.
About Professor. Sameera De Alwis
Greetings and welcome to all of you.I am pleased to introduce myself as a distinguished specialist in cyber security/cyber military intelligence with over 28 years of extensive experience. Throughout my career, I have demonstrated a proven track record of delivering exceptional results within budget constraints. My ability to excel in client interactions underscores my commitment to excellence. These achievements are crucial for businesses navigating today's competitive landscape. With my knowledge, experience, and dedication, I am confident in my ability to help business succeed in this challenging world.I possess a robust foundation in high-tech system exploitation, penetration testing, vulnerability assessments, architecture, and blueprinting. Also, secure military (Mil-Net) and campus network design, ISMS, BCP/DR, perimeter security hardening, and tactical defense. I am skilled in zero-day exploit techniques, team collaboration (red-team/blue-team, purple team, etc.), Assembly Language (x32/x64) and ansi/borland raw C/C++ coding , and reverse engineering for black and white-box testing.Furthermore, I have a wealth of experience and expertise in the field of cybersecurity. My skills include ethical hacking, digital and cyber forensics, system defect analysis, air gap and SCADA penetration testing, as well as exploiting intelligent mobile devices, web, and cloud applications. I have also conducted penetration testing for IoT, SoT, and AoT. In addition, I have a strong background in advanced threat intelligence, adversary simulation, persistent malware mitigation planning, and counter-sophisticated attacks. My diverse skill set and extensive knowledge in cybersecurity make me a valuable asset in ensuring the protection and resilience of critical systems.I am a highly skilled cyber defense contractor, well-equipped to handle your esteemed project. Establishing a strong relationship with clients is crucial to me, as it sets the stage for a prosperous business partnership within the project's framework. I place a high priority on clear/efficient communication to facilitate seamless collaboration and advancement. Throughout the project, I am committed to maintaining transparency, offering a detailed insight into the entire process. I am grateful for your willingness to support an individual who aims to emulate your success. Thank you in advance for considering my candidacy.I deeply yearn for the presence of my dear mother and grandmother, who has departed from this world. May they find ultimate peace and enlightenment in the realm of Nibbana.
Professor. Sameera De Alwis's current company
Company context helps verify the profile and gives searchers a useful next step.
Professor. Sameera De Alwis work experience
A career timeline built from the work history available for this profile.
President
CurrentHigh-Tech System Exploitation/Penetration Testing, Automated/Manual Vulnerability and System Defect Analysis, Device Specific Network and Security Audits (Firewall/IDS/IPS, VPN/HSM, Manhunt/Mantrap, Syslog/Honeypot, Wireless/Router/Switch/NAC Devices, etc.), Smart Systems/Portable or Mobile Device Penetration Testing and Vulnerability Analysis (IoT, AoT.
Senior Lecturer - Network And Information Security (Kingston University – Uk)
CurrentEsoft - Kingston University – UKMSc in Network and Information Security (Kingston University – UK) http://www.kingston.ac.uk/postgraduate-course/network-information-security-msc/http://www.esoft.lk/computer-studies/masters-degree-programme/msc-in-network-and-information-security-kingston-university-uk/Core Modules:CI7130- Network and Information.
President Of The Board Of Directors
CurrentCyber-Intel: The Front-Runner in Cyber-Security TrainingThe Cyber-Intel University is the prime and most consistent source for Cyber-Security training, the courses now reach more than 30+ batches around the island. Cyber-Intel is a lawfully incorporated business of Sri Lanka under the Companies Act #7 of 2007 and received the token of PV 127708 and termed.
Sigint (Signals Intelligence), Anti-Cyber Terrorism And Cyber-Warfare (Military) Consultant (Ex/In)
CurrentRemote Cyber Command-&-Control and Cyber Defense Independent Research Consulting for Persistent Threats, Resource Doxing Expert and Reconnaissance Researcher allied to SIGINT (Intelligence) Activities. Independent Anti-Cyber Terrorism Expert Advisor and Legal Jurisdiction Research Counselor. Cyber-Warfare Expert Researcher for Advanced Persistent Threats.
Senior Malware Analyst/Reverse Engineering Specialist
The scope to Reverse Engineering of numerous types malware samples and create anti-malware pattern with the perspective of debugging/disassembling the binary code to disassembly code (low-level static/dynamic code analysis methods)... with the use of NSA Ghidra, X-Rays IDA (Interactive Disassembler) Pro, GNU GDB, Binary Ninja, Olly Debug, Immunity.
Cryptology Academic Scientist, Cryptographic Lecturer And Researcher
Researching Grounds....Artificial Intelligence (Virtualized Neural Factor) Based Cryptanalysis TechnologiesDiscreet Cryptography Mathematics and Linear Cryptologic AlgebraManual and Mathematical Reverse Cryptography with FORTRAN, Maple, MathLab, AMPL and Wolfram MathematicaLinear Polygraphic Substitutions in Cryptography and Linear Shift Registers on.
Counter Cyber-Terrorism Specialist/Anti-Hack [Archangel Black Ops] Command Expert [Online]
[*] Cyber-warfare and Cold-war Strategies for Advanced Nation Security Vector-Grounds[*] Covert-Channel based Cyber-Attacks Countermeasures against Cyber-Terrorism Hacktivism[*] Intel. Squadron Lineup/Team Formation Strategical Plan and Implementation for Cyber-Battles[*] Attack-Forensics and Anti-Forensics on Cyber-Grids and Big-Data Sensitive Mil-Data.
Kernel Exploit, Vulnerability Researcher, And Expert Scientist In Special Military/Defense And Intel
Northrop Grumman, Lockheed Martin, General Dynamics specific systems and product range for military,defense,cyber,intelligence and tactical warfare systems such as JTAGS,Cyber Mission Platform,The Cyber Edge,C2BMC,M324 UAS,GMD FCC,IBCS,RQ-4 Block 20 Global Hawk,AESA Radars,AN/ZPY-1 STAR,LN-251 Advanced Airborne INS/GPS (EGI),AN/ZPY-5 VADER,MQ-4C.
Top-Secret Independent Cloud Security Consultant And Researcher (Military And Intelligence Division)
Researches Playground:- Compute/Storage Cloud - Cloud Based Elastic Storage Cryptography Technologies for Military/Intelligence Segment- Mil-CloudStack - Online Software Session Based Security Strategies for Military/Intelligence Classified Cloud Stacks/Pillars- Cloud Hosting - BigData and Smart-Grid Security for Mil-Cloud Stacks
Independent Contractor/Researcher (Device Firmware, Bootloader, Kernel And Device Driver Malware)
Operating Platforms:- Apple iOS (Mini Mac OS X)- Google Android - Microsoft Windows RT/Mobile- Research Motion BlackBerry RIM 10- Mozilla Firefox OS- Linux Mer Linux (Mer, /Mini, Sailfish and Tizen)- Ubuntu Touch Mobile Linux- Sailfish Mini Linux- Tizen Mobile LinuxMalware Researching Grounds:- Low Level Exploit Codes- Persistent Backdoors- Botnets.
Humint Advisor, Intel Researcher, And Intel Specialist
Black Psychological Operational Unit (Assigned) Research Areas:- Human Exploitation and Black Psychology - HUMINT (Human Intelligence) and Clandestine Services- Serious Human Mind Manipulation and Penetration- IMINT (Imagery Intelligence) and SVR Civilian OP-Analysis- Reverse Hypnotism and Espionage Counterparting - Interpersonal Contact Exploitation.
Contributing Author (The Only Sri Lankan Computer Forensics Author For The Eforensics Magazine)
CurrenteForensics Magazine is a community-oriented magazine. It is for digital forensics specialists and enthusiasts to work together and create a magazine of the best quality, attractive to every individual and enterprise interested in the electronic forensics field.MY ARTICLE ON THIS MAGAZINE: - Download 9.6 Mega.
Senior Manager (Head Of The Department Of Sit (Sumathi It)) - Cyber Security
Product Specific Network and Cyber Security Considerations (Cisco, Microsoft, Linux/UNIX, Android, Solaris, IRIX, iOS, IOS, and MacOSX), High-Performance Cyber-Security and Managed Cyber Security Services and Solutions, ISMS and Compliance InfoSec Audits (ISO, GDPR, DISA, PCI-DSS, NIST, FIPS, OWASP, SANS, SafeTAG, Security on TOGAF, and DoD 8570.01-M.
President/Founder
OVERVIEW: (Pacific's only Virtualized Retro Hardware and Software Museum)The sole objective is to formulate the Project "80[s] IT BACK TO THE FUTURE" is to fetch back every retro (vintage) computer technology (old-school) to the present-day or to the future. This is an utterly problematic mission due the absence of resources and nonexistence of the.
Senior Principal Consultant - Cyber Security And Cyber Intelligence
High-Tech System Exploitation/Penetration Testing, Automated/Manual Vulnerability and System Defect Analysis, Device Specific Network and Security Audits (Firewall/IDS/IPS, VPN/HSM, Manhunt/Mantrap, Syslog/Honeypot, Wireless/Router/Switch/NAC Devices, etc.), Smart Systems/Portable or Mobile Device Penetration Testing and Vulnerability Analysis (IoT, AoT.
Head Of Operations - Cyber Security And Cyber Intelligence
Product Specific Network and Cyber Security Considerations (Cisco, Microsoft, Linux/UNIX, Android, Solaris, IRIX, iOS, IOS, and MacOSX), High-Performance Cyber-Security and Managed Cyber Security Services and Solutions, ISMS and Compliance InfoSec Audits (ISO, GDPR, DISA, PCI-DSS, NIST, FIPS, OWASP, SANS, SafeTAG, Security on TOGAF, and DoD 8570.01-M.
Senior Lecturer - Computer Systems And Networking (Greenwich University – Uk)
PIBT - Greenwich University – UKBSc (Hons) Computer Systems and Networking (Greenwich University – UK) https://www.gre.ac.uk/ug/ach/g404http://www.pibtsl.com/bsc-hons-computer-systems-networking/http://www.pibtsl.com/wp-content/uploads/2015/02/BSc-Hons-Computer-Systems-Networking.pdfThe BSc (Hons) Computer Systems & Networking is designed for individuals.
Lead Advisor, Lead Computer/Cyber/Net Forensics Investigator [High-Tech Crime Investigation Unit]
INVESTIGATION ARENAS:- Social Media (Facebook, LinkedIn, Google+) & Social Network- Search Engine/SEO Bot, Leecher/Tracker (Torrent), Spidering & Crawler - Cloud & Virtualization (Hyper-V, VMWare, VirtualBox etc)- e-Commerce, m-Commerce, e-Money & Bitcoin- Botnet, Darknet, DDoS & APT- Protocol & Kernel Forensics- Anonymizer Forensics (TOR, VPN, HIDE IP.
Ceo/Info-Sec Consultant, Researcher/Scientist, Legal Advisory, Computer/Cyber Forensics Investigator
Reverse Code Engineering encompasses Multi-platform Assembly Language Development, Software Security Concepts and Solutions, Software Core Architecting, Web Technology security, Operating System Reverse Engineering, Shell Scripting, Programming Language Compilers Researching and Reversing, Emulation Design for Multiplatform, Computer Viruses, Worms.
Independent Digital Forensics Technology Consultant/Legal Advisor
Exclusive Consultancy Pitches: - Highest Gauge Computer and Cyber Forensics- Extreme Malware Forensics and High-Tech Crime Investigations- Modern Cyber Threat and Persistent Malware Threat Forensics- Cyber-Warfare/Cold-War Impact Mitigation and Normalizing Tactical Forensics- Extreme Digital Device Forensics- Legal Jurisdictions on Cyber/Digital and.
Penetration Tester (Scada Platforms (Siemens), Enterprise Level Erp(S) - (Sap/Microsoft Dynamics))
Started Vulnerability Research and Enterprise Penetration Testing on subsequent Enterprise Systems,Key References,SCADAhttp://en.wikipedia.org/wiki/SCADASiemens SCADA - http://www.automation.siemens.com/mcms/human-machine-interface/en/visualization-software/scada/pages/default.aspxOther SCADA.
Independent Researcher (Icap Integration To Cisco Subsystem/Core Architecture) For Perimeter Defense
References and Introduction,http://en.wikipedia.org/wiki/Internet_Content_Adaptation_ProtocolIn my research, I am focusing on implementation of Cyber-Traps (Custom Coded), Ingress-Egress Filtering (Firewalls), Anti-Malware, Manhunt and Mantraps (IDS(s)/Honeypots) and Decoy/Lure Environments at the Edge Router Level.Research Paper Available Soon
Digital Defense And Info-Sec Contractor, Consultant And Senior Lecturer
Smart Power-Grid and Siemens SCADA Platform Security, Nuclear Fusion Reactors (Digital Security) and Lecturer (Extreme Custom made Exploits Development, Vulnerability Discovery, Code Analysis, Advanced Malware Techniques and Remote/Local Arbitrary Command Execution on numerous segments of the Network/Internetwork Devices (Heap, Stack and Buffer.
Ceo/Snr. Info-Sec Consultant, Legal Advisory, Computer/Cyber Forensics Investigator
My proficiency contextual encompasses with Information security management, Security Policy development and implementation, Business Continuity (BCP) and Disaster Recovery (DRP) planning, Intrusion Detection/Prevention engineering and implementation, Perimeter Security Device administration consulting and training, Incident handling and reporting.
Independent Senior Consultant/Advisor For Foreign Intelligence And Counterintelligence Surveillance
Independent Consultant/Advisor for Foreign Intelligence/Counterintelligence Surveillance (Judicial Electronic Interceptions/Espionage) Mass Surveillance of Global Intelligence Community (GIC)Expertise in USA/UK-Europe Governing Intelligence Acts: - Foreign Intelligence Surveillance Act (FISA)- FISA Amendments Act (FAA) - Foreign Intelligence Surveillance.
Independent Researcher (Cisco Sinkhole Router For Malware Mitigation - Blackhole Filter) For Isp-Sec
References and Introduction,http://en.citizendium.org/wiki/Sinkhole_(Computer_network)http://www.cisco.com/web/about/security/intelligence/worm-mitigation-whitepaper.htmlResearch Paper Available Soon
Senior Lecturer/Consultant
Ethical Hacking, Cyber Security, Computer Security, Assembly Language, B.Sc. IT, MBA, DBA, Ph.D., Computer Forensics
Blackhat Seo (Search Engine Optimization) Tech-Lead And Scientist
Low-Level, Hostile and Potent Search Engine BOT Hacking Tactics, Tactical Search Engine Optimization Architectural Attacks to Core Search Engine BOT(s), Hacking Mass Search Engine BOT(s) such as Google Web Crawler BOT and Bing Leecher BOT,.HTACCESS Search Engine BOT Manipulation, ROBOT.TXT Based Search Engine BOT Hacking, Forceful HTML Meta-Tag Injections.
Senior Lecturer (Computer Low-Level Programming And System Low Level Coding)
Unix 32/64 bits (x86-x64) Assembly Language - Workstation/ServerLinux 32/64 bits (x86-x64) Assembly Language - Workstation/ServerMicrosoft Windows 32/64 bits (x86-x64) Assembly Language - Workstation/Server Sun Solaris 64 bits (x64) Assembly Language - ServerApple MacOSX 32/64 bits (x86-x64) Assembly Language - Workstation/ServerGoogle Android 32 bits.
Senior Lecturer And Senior Education Consultant (Cyber/Computer Security And Digital Forensics)
Trained officials (Solicitors/Lawyers) from Courts of Sri Lanka for Digital (Computer/Cyber Forensics) Investigations, Cyber/Computer and Information Security - Official training program and course conducted by University of Colombo and AIMS College International - Colombo.
Independent Researcher (Darknet(S), Apt(S) (Advanced Persistent Threat) Clusters And Ai Botnet(S))
I was authoritatively consigned to ensue through the research segment of subsequent Attack Vectors,1). DarkNet(s)-(File Sharing) - http://en.wikipedia.org/wiki/Darknet_(file_sharing)2). APT(s) - http://en.wikipedia.org/wiki/Advanced_persistent_threat3). BotNet - http://en.wikipedia.org/wiki/Botnet
President/Ceo, And Founder
[Welcome to HI-Cyber Campus Online ("GET CERTIFIED FROM THE QUALIFIED")] - The Only Fully Virtualized Cloud Based Campus in Pacific Cyberspace (Proudly from Motherland Sri Lanka - Host Power from Israel) - Powered with Ultimate Cisco and BlackBerry Enterprise Cloud based fully Virtualized Facilities. We initiated our premier grade of fully online.
President/Private Detective/Special Agent: Cid [High-Tech Crime Investigation Division/Intelligence]
- Lawful Interception Device Hardware/Software- Corporate/Private Professional Detective Services- Digital Financial, Bank, & Insurance Crimes/Frauds- Spy Products & DRM Solutions- Pre/Post Employee Verification Services- Record Search & Verifications Services- Missing Person Detective Services- 419 Email Related Frauds/Scams (Ex. Nigerian)- Patent.
Founder
I am the initiator and the founder of DEFCON [Sri Lanka] (The Largest Hacking Conference) and we are the registered (official) DEFCON initiative in Sri Lanka under the worldwide channel of DEFCON (DEF CON Communications, Inc - https://www.defcon.org/ and received the ID of DC9411 - Sri Lanka),[https://www.defcongroups.org/dcpages-int.html] This mammoth.
Senior Lecturer, Senior Information Security Consultant And Computer/Cyber Forensics Advisor
I am one of the prominent educational consultant and advisor for Ethical Hacking, Cyber Security, Computer Security, Computer Forensics, Cyber Forensics and Digital Forensics for global forum of department of criminal investigations in the police departments (world-wide). I am rendering my services (opinion councilling and specific digital forensic cases.
Senior Lecturer - Cloud Security And Network Security
Esoft - London Metropolitan UniversityBEng (Hons) in Computer Networking Top-Up (London Met – UK) https://www.esoft.lk/computer-studies/top-up-degree-programmes/beng-hons-top-up-computer-networking-london-met-uk/CC6004 – Network and Cloud SecurityFC6P01 – Project
Senior Lecturer - Cisco Network Security (Ccna Security Academic Curriculum)
Esoft - London Metropolitan UniversityBEng (Hons) in Computer Networking Top-Up (London Met – UK) https://www.esoft.lk/computer-studies/top-up-degree-programmes/beng-hons-top-up-computer-networking-london-met-uk/CT6004 – Network Security(Cisco)FC6P01 – Project
Senior Lecturer - Computer Security (De Montfort University (Dmu), Leicester, Uk)
Auston - De Montfort University (DMU), Leicester, UKhttp://dmu.ac.uk/study/courses/undergraduate-courses/computer-security-bsc-degree/computer-security-bsc-hons-degree.aspxhttps://auston.edu.lk/bachelors-degee-science-computer-security/System Defence Strategies:Topics to be considered include Incident Response and Penetration Testing, considered to be key.
Senior Lecturer - Computer Network Security (Birmingham City University – Uk)
Auston - Birmingham City University – UKBSc in Computer Network Security (Birmingham City University – UK) http://www.bcu.ac.uk/courses/computer-networks-and-security-bsc-hons-msci-2017-18https://auston.edu.lk/bachelor-of-science-computer-network-security/Core Modules:- Peresonal Identification and Authentication Systems- Individual Project
Senior Lecturer And Senior Education Consultant (Cyber/Computer Security And Digital Forensics)
Trained officials from Sri Lanka Department of Police and CID Sri Lanka for Digital (Computer/Cyber Forensics) Investigations, Cyber/Computer and Information Security - Official training program and course conducted by University of Colombo.
Head Of Information Security And Group Information Security Consultant
Perimeter Security Architecting/Implementation of The Intranet/Extranet, High-Tech Digital Defense and Cyber Security Tactical Planning and Implementation, Digital Mass Media Security for Media Base-Stations, Data Loss Prevention of The Company's Critical Assets, Internal/Corporate Legal Prosecutions for Digital Policy/Procedure Violations.
Sl-Cert|Cc - Founder Member And Senior Information Security Consultant
Engaged as a Founder Member, Senior Information Security and Computer/Cyber Forensics Consultant and Trainer of Sri Lanka CERT|CC (Computer Emergency Readiness Team|Coordination Center). Exertions which was carried out throughout the period of engagement,- Setting-up the High Performance Internal Network Infrastructure (LAN/WAN and INTERNET) of CERT|CC.
Senior Systems Auditor, Penetration Tester And Senior Information Security Consultant
Engaged as a Senior Information Security Consultant and Senior Systems Auditor of ICTA Sri Lanka (Information and Communication Technology Agency of Sri Lanka). Exertions which was carried out throughout the period of engagement,- Conducted the Deep Internal Systems Audit of ICTA - Conducted the Comprehensive Range of Deep System Vulnerability Assessment.
Information Security And Reverse Engineering Consultant
Business and Technical Continuity Planning and Disaster Recovery, High-Tech Digital Defense and Cyber Security Strategic Forecasting and Implementation, Perimeter Security Architecting/Implementation of The Intranet/Extranet, Corporate and Business Computer/Digital Criminal Legal Advisory for The Internal Legal Department, Secure the Top-Tier Board's.
Information Security Specialist
High-Performance Networking with Corporate System Integration, High-Tech Researches for New-Breed Technologies, Remediation and Consultation for the Top-Tier Management, Data Loss Prevention of The Company's Critical Assets, Business and Technical Continuity Planning and Disaster Recovery, Cyber Security and Allied Supplementary Security Related Issues.
Professor. Sameera De Alwis education
Cyber Intelligence And Cyber Security, Cyber/Computer Forensics And Counterterrorism
Post Doctoral Research Student, It And Information Security
Dba - Doctor Of Business Administration, It, Information Security (Project Ravana)
Interim Crash Courses, Backup/Disaster Recovery, Firewall, Utm And Supplementary Perimeter Defense
Interim Crash Courses, Firewall, Utm And Supplementary Perimeter Defense
Interim Crash Courses, Generic Security, Anti-Malware, Noc/Soc Solutions And Hsm Solutions
Interim Crash Courses, Generic Information Security And Perimeter Defense
Interim Crash Courses, High Performance Networking/Os And Clustering, Mobile/Wireless Engineering And Telecommunication
Dcsd, Computer Science
Foundation Degree, Agriculture, Agriculture Operations, And Related Sciences
Frequently asked questions about Professor. Sameera De Alwis
Quick answers generated from the profile data available on this page.
What company does Professor. Sameera De Alwis work for?
Professor. Sameera De Alwis works for ICBT Campus.
What is Professor. Sameera De Alwis's role at ICBT Campus?
Professor. Sameera De Alwis is listed as Senior Lecturer - Cyber Security at ICBT Campus.
Where is Professor. Sameera De Alwis based?
Professor. Sameera De Alwis is based in Colombo District, Western Province, Sri Lanka while working with ICBT Campus.
What companies has Professor. Sameera De Alwis worked for?
Professor. Sameera De Alwis has worked for Icbt Campus, Cyber-Intel Online (Pvt) Ltd, Kingston University - Company, Cyber-Intel University (Online), and Eforensics Magazine.
How can I contact Professor. Sameera De Alwis?
You can use AeroLeads to view verified contact signals for Professor. Sameera De Alwis at ICBT Campus, including work email, phone, and LinkedIn data when available.
What schools did Professor. Sameera De Alwis attend?
Professor. Sameera De Alwis holds Cyber Intelligence And Cyber Security, Cyber/Computer Forensics And Counterterrorism from Mcafee Institute.
Search by job title, company, industry, location, and seniority. Export verified B2B contact data when you need it.
Start free trial