Professor. Sameera De Alwis Email and Phone Number
Professor. Sameera De Alwis personal email
- Valid
- Valid
Greetings and welcome to all of you.I am pleased to introduce myself as a distinguished specialist in cyber security/cyber military intelligence with over 28 years of extensive experience. Throughout my career, I have demonstrated a proven track record of delivering exceptional results within budget constraints. My ability to excel in client interactions underscores my commitment to excellence. These achievements are crucial for businesses navigating today's competitive landscape. With my knowledge, experience, and dedication, I am confident in my ability to help business succeed in this challenging world.I possess a robust foundation in high-tech system exploitation, penetration testing, vulnerability assessments, architecture, and blueprinting. Also, secure military (Mil-Net) and campus network design, ISMS, BCP/DR, perimeter security hardening, and tactical defense. I am skilled in zero-day exploit techniques, team collaboration (red-team/blue-team, purple team, etc.), Assembly Language (x32/x64) and ansi/borland raw C/C++ coding , and reverse engineering for black and white-box testing.Furthermore, I have a wealth of experience and expertise in the field of cybersecurity. My skills include ethical hacking, digital and cyber forensics, system defect analysis, air gap and SCADA penetration testing, as well as exploiting intelligent mobile devices, web, and cloud applications. I have also conducted penetration testing for IoT, SoT, and AoT. In addition, I have a strong background in advanced threat intelligence, adversary simulation, persistent malware mitigation planning, and counter-sophisticated attacks. My diverse skill set and extensive knowledge in cybersecurity make me a valuable asset in ensuring the protection and resilience of critical systems.I am a highly skilled cyber defense contractor, well-equipped to handle your esteemed project. Establishing a strong relationship with clients is crucial to me, as it sets the stage for a prosperous business partnership within the project's framework. I place a high priority on clear/efficient communication to facilitate seamless collaboration and advancement. Throughout the project, I am committed to maintaining transparency, offering a detailed insight into the entire process. I am grateful for your willingness to support an individual who aims to emulate your success. Thank you in advance for considering my candidacy.I deeply yearn for the presence of my dear mother and grandmother, who has departed from this world. May they find ultimate peace and enlightenment in the realm of Nibbana.
-
Senior Lecturer - Cyber SecurityIcbt CampusWestern Province, Sri Lanka -
PresidentCyber-Intel Online (Pvt) Ltd Nov 2017 - PresentKiribathgoda, Western, LkHigh-Tech System Exploitation/Penetration Testing, Automated/Manual Vulnerability and System Defect Analysis, Device Specific Network and Security Audits (Firewall/IDS/IPS, VPN/HSM, Manhunt/Mantrap, Syslog/Honeypot, Wireless/Router/Switch/NAC Devices, etc.), Smart Systems/Portable or Mobile Device Penetration Testing and Vulnerability Analysis (IoT, AoT, SoT, and WoT), Cyber-Crime/Digital (Electronic Crime) Investigations/Forensics, High-Tech Cyber Intelligence and Surveillance/Cyveillance Services, Cyber-Law, Computer/Electronic Crime Jurisdictional Services, High-Tech Data Sanitize for Electronic Wastes (E-Wastes), Secure Data Wiping/Zapping, Digital Shredding Services (BHMG IS5-BS/ES, NAVSO P-5239-26, USAF SSI 5020, US DoD UHDD/5220.22-M, Peter Gutmann, GFOIS, CN ITSG-06, NIST SP-800-88 and REV.1, NSA/CSS SDDM, AGICTM-2014, and NZSIT 402 Based Advanced Algorithms), Advanced Threat Intelligence/Sophisticated Threat Mitigation Service for Fileless Malware, APT (Advanced Persistent Threats), Botnets, Hybrid Covert Malware, Ransomware, Advanced Bootkit/Rootkit Infections, Stealers (Against Covert Mode Silent Data Infiltrate/Exfiltrate Attacks), OnDemand Persistent Malware (Trojan/Spyware/Keylogger, etc.), and Sophisticated Malformed USB Attacks (Bad-USB, Rubber-Duck, Hardware Keyloggers, etc.), High-Fidelity DoS (Denial of Service) Attack Mitigation Services (Evade from DoS/DDoS/RDoS/TDoS and Specific Agent Based Malformed Threats (Zombies/Botnets, and Trojan Horses), Private Investigation and Digital/Cyber Defense Contracting Services, Military-Grade Cyber/Information Defense Solutions, Superior Grade Information (InfoSec)/High-Tech Network/Cyber Intelligence and Cyber Security Corporate Educational Services and Hands-On Bootcamps/Awareness Workshops for Enterprise/SOHO, and SME Businesses, and Highly Sophisticated Enterprise-Military Grade (Ultra Secured and Ultra Performance) Data Transfer Systems Planning and Implementations for Corporate/Enterprise Businesses. -
Senior Lecturer - Network And Information Security (Kingston University – Uk)Kingston University - Company Jan 2017 - PresentLondon, Greater London, GbEsoft - Kingston University – UKMSc in Network and Information Security (Kingston University – UK) http://www.kingston.ac.uk/postgraduate-course/network-information-security-msc/http://www.esoft.lk/computer-studies/masters-degree-programme/msc-in-network-and-information-security-kingston-university-uk/Core Modules:CI7130- Network and Information SecurityCI7000- Project Dissertation -
President Of The Board Of DirectorsCyber-Intel University (Online) Nov 2017 - PresentKelaniya, Western, LkCyber-Intel: The Front-Runner in Cyber-Security TrainingThe Cyber-Intel University is the prime and most consistent source for Cyber-Security training, the courses now reach more than 30+ batches around the island. Cyber-Intel is a lawfully incorporated business of Sri Lanka under the Companies Act #7 of 2007 and received the token of PV 127708 and termed as Cyber-Intel Online (Pvt) Ltd.The Cyber-Intel University delivers transitioning and students with a pathway into the cybersecurity staff. Cyber-Intel is honored to offer our nation and are nominated for the course with studentships based cutting-edge technical skills training, our targeted certifications, and networks to highest-paying jobs in cybersecurity in the world. -
Sigint (Signals Intelligence), Anti-Cyber Terrorism And Cyber-Warfare (Military) Consultant (Ex/In)Cyber-Intel University (Online) May 2017 - PresentKelaniya, Western, LkRemote Cyber Command-&-Control and Cyber Defense Independent Research Consulting for Persistent Threats, Resource Doxing Expert and Reconnaissance Researcher allied to SIGINT (Intelligence) Activities. Independent Anti-Cyber Terrorism Expert Advisor and Legal Jurisdiction Research Counselor. Cyber-Warfare Expert Researcher for Advanced Persistent Threats and interconnected Criminal/Cyber Guerilla movements based on Covert Intelligence/Criminal (online) Deep-Webs/Deep-Nets and Dark-Nets. [More Information Classified] -
Senior Malware Analyst/Reverse Engineering SpecialistCyber-Intel University (Online) May 2020 - Dec 2020Kelaniya, Western, LkThe scope to Reverse Engineering of numerous types malware samples and create anti-malware pattern with the perspective of debugging/disassembling the binary code to disassembly code (low-level static/dynamic code analysis methods)... with the use of NSA Ghidra, X-Rays IDA (Interactive Disassembler) Pro, GNU GDB, Binary Ninja, Olly Debug, Immunity Debugger, Affinic Debugger, Intel Raw Debugger, MacsBug, Valgrind with Valkyrie, Visual Studio Debugger, and WinDbg for multiple platforms as a Contract Reverse Engineering Specialist and Senior Malware Analyst. -
Cryptology Academic Scientist, Cryptographic Lecturer And ResearcherCyber-Intel University (Online) Sep 2018 - Sep 2020Kelaniya, Western, LkResearching Grounds....Artificial Intelligence (Virtualized Neural Factor) Based Cryptanalysis TechnologiesDiscreet Cryptography Mathematics and Linear Cryptologic AlgebraManual and Mathematical Reverse Cryptography with FORTRAN, Maple, MathLab, AMPL and Wolfram MathematicaLinear Polygraphic Substitutions in Cryptography and Linear Shift Registers on CryptoSelf-Reciprocal, Homogeneous, Decomposed and Binary Linear Substitutions on Encryption TechnologiesMultiple Anagramming, Transposition and Double Columnar Transposition in Cryptology and EncryptionsLinear/Hi-Tech Cryptanalysis and Supplementary Crypto Reversing MethodsBitwise Processing (Covert Cryptography) and Cryptanalysis of Stream Cipher and Block Cipher Attack VectoringCipher-Text Attacks, Negative Pattern Search and Heuristic Bias Match CryptingProbabilistic Bias Removal Method, Confusion and Diffusion of CryptographyMonoalphabetic Simple Encryptions and Monoalphabetic Polygraphic EncryptionsUnkeyed Hash Functions (MDC) and Keyed Hash Functions (MAC)Multiple-Precision Modular Arithmetic and Attacks on CryptosystemsPseudorandom Functions and Kleptogram Attack MethodologyMessage Authentication Codes and Efficient Algorithms for Discrete ArithmeticCryptographically Secure Pseudorandom Bit Generation in CryptographyMessage Authentication, Data Integrity and Advanced Attacks on Hash FunctionsMultiple-Precision Integer Arithmetic and Attacks on Identification ProtocolsFeedback Shift Registers and Factoring Polynomials over Finite FieldsGreatest Common Divisor Algorithms and Exponent RecodingExploiting The Quadratic Residuosity Problem and ExponentiationPolygraphic Substitution and Cryptologic Coding TheoryQuasi-Nonperiodic Keys based Cryptography and Encryption TechniquesBinary Non-Coincidence Exhaustion, Vernam Encryption and Secrecy Versus AuthenticationCovert Plaintext-Cryptotext Compromise and The De Viaris Attack VectorsDifferential Cryptanalysis and Brute-Force Attack Vectoring -
Counter Cyber-Terrorism Specialist/Anti-Hack [Archangel Black Ops] Command Expert [Online]Cyber-Intel University (Online) Dec 2017 - Dec 2019Kelaniya, Western, Lk[*] Cyber-warfare and Cold-war Strategies for Advanced Nation Security Vector-Grounds[*] Covert-Channel based Cyber-Attacks Countermeasures against Cyber-Terrorism Hacktivism[*] Intel. Squadron Lineup/Team Formation Strategical Plan and Implementation for Cyber-Battles[*] Attack-Forensics and Anti-Forensics on Cyber-Grids and Big-Data Sensitive Mil-Data Pools[*] Research and Scientific Projects for Future Cyber-Crimes Landscape [*] Scientific Projects Setup and Implementation Experiments for Future Cyber-Defense[*] Mentoring for Academic Projects in Digital Defense Squadrons[*] Intelligence Gathering over Mass Metadata Harvesting in Big-Data Mil-Clouds[*] Lawful Interception and Cloud-Forensics for Cyber-Terrorist Activities[*] Mass Surveillance on Digital Devices and Initiate Crypto-Backdooring (Experiments)[*] SIGINT (Signal Intelligence)-ComSEC (Communication-Security) Activities for Counter Attack[*] Crypto-Data and Hash-Crypto Vectored Algorithms Experiments[*] Stealth Mass Cyber-Attacks Planning and Experimenting for Counter-Terrorism[*] Plan/Digital Evacuate Procedures, and Disaster Recovery Process Creations on Cyber-Attack[*] Research Ground Preparation on Counter Cyber-Intelligence for Anti-Digital Forensics[*] Mass Device Exploitation with Custom Code (Private) Exploits/Rootkits[*] PWN2OWN Experiments to Counter-Attack (Offensive Attack) to Cyber-Terrorists[*] Automated Counter-Attack Planning for Cyber-Attack on Critical Infrastructures[*] Mass Cyveillance Tech and High-Tech Cyber-Attack Countermeasures[*] SIGINT (Signal Intelligence) Cryptographic Manipulation for Distant Vector Attacks[*] Signal Forensics - Identify Signaling Attacks for Military Facilities (Experiments)[*] Air-Gapped Persistent Attack Defense for Critical Infrastructures[*] APT, Fileless Malware, Rootkits and AI Trojans (Multifunctional Literal Movement) Experiments[*] Reporting/Documenting Cyber-Policies and Procedures for Cyber-Squadron of Military-Intel. -
Kernel Exploit, Vulnerability Researcher, And Expert Scientist In Special Military/Defense And IntelCyber-Intel University (Online) Aug 2018 - Oct 2019Kelaniya, Western, LkNorthrop Grumman, Lockheed Martin, General Dynamics specific systems and product range for military,defense,cyber,intelligence and tactical warfare systems such as JTAGS,Cyber Mission Platform,The Cyber Edge,C2BMC,M324 UAS,GMD FCC,IBCS,RQ-4 Block 20 Global Hawk,AESA Radars,AN/ZPY-1 STAR,LN-251 Advanced Airborne INS/GPS (EGI),AN/ZPY-5 VADER,MQ-4C Triton,Citadel Enterprise Battle Command System,Sentinel-XD,AN/APG-80 F-16 AESA,AN/AAQ-37 and AN/AAQ-32 Internal FLIR Targeting System (IFTS),AOC WS,ACE,AN/APN-241 and AN/TYQ-23,Automatic RF Distribution System,E-2D Advanced Hawkeye,Next-Generation BioTRAC,BACN,C2BMC,CWIN,AWACS APY-2,Bat UAS,Defence ATM Park Air M7 VHF/UHF,CGA,DA I-GATE,eCORE,C2CE,TIGER,SUDS,Software Defined Radio Systems (SDRs),SCORPION,SABR-GS,ROBE,RTSA,MESA,C4I,,JMEC,GMD FCC,HART,MP-RTIP, and Surveillance Radar Systems,Stalker XE UAS,JSTARS,UTCS,STANAG 4586,P-3 Orion,DIAMONDShield Integrated Air & Missile Defense,SBIRS,SeaCommander,Warfighter Information Network - Tactical (WIN-T),Kestrel Flight Systems and Autopilot,MQ-25,Desert Hawk III UAS,Indago,Orca XLUUV,K-MAX,Procerus,U-2 Dragon Lady,Stalker XE UAS,Multi-Domain Command and Control,Intelligence, Processing, Dissemination and Exploitation and Integrated Intelligence Surveillance Reconnaissance Systems,Siemens SIMATIC STEP 7,SIMATIC TIA,Integrated Data Center Management Suite (IDCMS),LOGO!Soft Comfort,SIMOCODE ES,SIMATIC WinCC,SIMATIC PDM/PCS,SINAMICS StartDrive,DIGSI,SOFTNET Security,C4ISR Solutions, Imagery, Signals Intelligence (ISR),Multi-intelligence Solutions,Surface EW,Ground EW,Airborne EW, and Cyber EW, The Cyber Kill Chain/Intelligence Driven Defense,Persistent Combat Support 74k Aerostat,Persistent Border Security 420k Aerostat,Persistent Maritime Surveillance 56k Aerostat,High Altitude Airship (HAA), and High Altitude Long Endurance Demonstrator (Hale-D), etc. Control Circuit/Hardware BIOS/OS Kernel and Device Driver Rootkit/Exploit and Shellcode Researcher and Penetration Testing advisor. -
Top-Secret Independent Cloud Security Consultant And Researcher (Military And Intelligence Division)Cyber-Intel University (Online) Sep 2017 - Sep 2019Kelaniya, Western, LkResearches Playground:- Compute/Storage Cloud - Cloud Based Elastic Storage Cryptography Technologies for Military/Intelligence Segment- Mil-CloudStack - Online Software Session Based Security Strategies for Military/Intelligence Classified Cloud Stacks/Pillars- Cloud Hosting - BigData and Smart-Grid Security for Mil-Cloud Stacks -
Independent Contractor/Researcher (Device Firmware, Bootloader, Kernel And Device Driver Malware)Cyber-Intel University (Online) Sep 2014 - Sep 2019Kelaniya, Western, LkOperating Platforms:- Apple iOS (Mini Mac OS X)- Google Android - Microsoft Windows RT/Mobile- Research Motion BlackBerry RIM 10- Mozilla Firefox OS- Linux Mer Linux (Mer, /Mini, Sailfish and Tizen)- Ubuntu Touch Mobile Linux- Sailfish Mini Linux- Tizen Mobile LinuxMalware Researching Grounds:- Low Level Exploit Codes- Persistent Backdoors- Botnets Connected DarkNets- APT (Advanced Persistent Threats)- Rootkit Kernel Hooking- Bootkit Boot-Strap Loader Hooking- Trojan Based Malicious Payload Stubs - Buffer Overflows- Virus and Malicious Scripts- Heap Sprays and Overflows- Stack Smashes and Overflows- Buffer Underruns- DDoS (Remote/Local DoS)- Shrink Wrap CodesDeep Analysis Methods:- Low Level Debugging- Root/Kernel Disassembling - Assembly Language based Reverse Engineering- Dissecting and Decoding- Crypto Reversing -
Humint Advisor, Intel Researcher, And Intel SpecialistCyber-Intel University (Online) Jul 2017 - Jul 2019Kelaniya, Western, LkBlack Psychological Operational Unit (Assigned) Research Areas:- Human Exploitation and Black Psychology - HUMINT (Human Intelligence) and Clandestine Services- Serious Human Mind Manipulation and Penetration- IMINT (Imagery Intelligence) and SVR Civilian OP-Analysis- Reverse Hypnotism and Espionage Counterparting - Interpersonal Contact Exploitation- LOVEINT (Love Intelligence) and Human Factor Analysis- Espionage and Active Counterintelligence- SEXINT (Sex Intelligence) and Rezidentura Analysis- MASINT (Measurement and Signature Intelligence)- Clandestine HUMINT Operations (Tradecraft)- Friendly Accredited Diplomat Acquisition- Special Reconnaissance (SR) and Decloaking Pseudonym - Civilian Affairs and Civilian Human Intelligence- GEOINT and ELINT (Electronic Intelligence)- Non-Cooperative Target Recognition- Unconventional Warfare (UW) and Electronic Communications- Covert Action/Eagle Eye and Euphemism Analysis- Diplomatic Exploitation and undercover Gropovod Research - Access Agents and Traveler Debriefing- OSINT, TECHINT Factuals, and Car Toss Analysis- Deep Physiological Examinations and Double Agent ID Decloak- Emergency Exfiltration and Infiltration Probability Porting- Plain Language Code and COMINT Operations- IntelligenceNet Special[OP] and Society Propaganda Model- MEDINT and National/International Clandestine Services- Intermingle Espionage and Soviet Espionage Communications- Counterintelligence and Force Sabotage- Countersurveillance and FININT Operations- Local/International Agent Subnetwork and Microphotography- Maintaining Psychological Control and Dead Drop Analysis- Foreign Internal Defense (FID) Analysis- Cyber Intelligence (CI)/Digital Network Intelligence (DNI)- Steganography and Signals Intelligence (SIGINT) - Spetssvyaz (Federal) Access and GRU C&C Operations- Spread-Spectrum and Frequency-Hopping Spread Spectrum Research - Covert Channels and Foreign Intelligence Services (FIS)Rest of Info Classified -
Contributing Author (The Only Sri Lankan Computer Forensics Author For The Eforensics Magazine)Eforensics Magazine Aug 2013 - PresentWarsaw, Mazovian Voivodeship, PleForensics Magazine is a community-oriented magazine. It is for digital forensics specialists and enthusiasts to work together and create a magazine of the best quality, attractive to every individual and enterprise interested in the electronic forensics field.MY ARTICLE ON THIS MAGAZINE: - Download 9.6 Mega Byteshttps://drive.google.com/file/d/0B3yIlPZORYXOT3VyeGNsdkY3czE0YjJJUmdwSk5EVWZrMnM4/edit?usp=sharinghttp://eforensicsmag.com/ -
Senior Manager (Head Of The Department Of Sit (Sumathi It)) - Cyber SecuritySumathi Holdings Sep 2020 - Oct 2021Colombo, Western, LkProduct Specific Network and Cyber Security Considerations (Cisco, Microsoft, Linux/UNIX, Android, Solaris, IRIX, iOS, IOS, and MacOSX), High-Performance Cyber-Security and Managed Cyber Security Services and Solutions, ISMS and Compliance InfoSec Audits (ISO, GDPR, DISA, PCI-DSS, NIST, FIPS, OWASP, SANS, SafeTAG, Security on TOGAF, and DoD 8570.01-M, etc.), Universal Data Recovery and High-Tech Password Recovery Services, On-Device Local/OnDemand Remote Device Hardening, High-Tech Ethical Hacking Services, Business/Competitive Intelligence and Business Espionage Solutions, Tactical Physical Defense Services with Spy-Cam Embedded Solutions and Unmanned Vehicle (For Combatting Robots, UGV, UAV (Drones)) Based Anti-Disaster Mitigation Solutions, Self-Governing Tactical Enterprise Grade Emergency Readiness and Incident Mitigation Services (Enterprise CIRT/CERT, Red Team, Blue Team, Purple Team and Tiger Team Formation), Exclusive Grade BCP (Business Continuity)/DRP (Disaster Recovery) and High-Tech DLP (Data Leak Prevention) Solutions, Exclusive Grade Device Performance/Health, and Configuration Enhancement Audits (To Adjust Optimal Settings for Maximum Sustainable Device Throughputs on Every Network/Server, Security or Hardware Device), Self-Governing Vulnerability Management and Vulnerability Assessment Services, Highly Advanced Social Engineering/Reverse Social Engineering with Spear Phishing and Sophisticated Information Reconnaissance/Human-Being Targeted Attack Audits, High-Performance and Highly Secured NOC, SOC, ROC, Conventional or Cloud Based DR/Data Centers Blueprinting and Establishment, Optimized Software Security Architecting and High-Specific Software Security Code Audits, Tight Security Implementation for Cryptocurrency Pharming and Mining Operations/Advanced Security Implementation for Legal Electronic Coin/Legal and Ethical Money Laundering Businesses, Advanced and Custom Mode Onion Based Anonymity, and Shadow/Stego Data Transmission in Plain Sight. -
President/FounderProject "80[S] It Back To The Future" (The Only "Virtualized Retro Hardware And Software Museum") May 2015 - Oct 2021OVERVIEW: (Pacific's only Virtualized Retro Hardware and Software Museum)The sole objective is to formulate the Project "80[s] IT BACK TO THE FUTURE" is to fetch back every retro (vintage) computer technology (old-school) to the present-day or to the future. This is an utterly problematic mission due the absence of resources and nonexistence of the required obsolete systems or technologies in the present day. Then again, I courageously procured this as a challenge and now I am trying to overwhelm every forthcoming complication which is going arise in-front of me to thrive this national mission. Our present-day fresh generation and next generation certainly not acquire an opportunity to work on such retro hardware systems and software platforms/applications. The (By formation this project) individuals who are enthusiastic to acquire real low level computer programming/coding, systems knowledge, can be succeeded with the “Retro Computer System Museum”. I am trying to virtualize every vintage consumer computer platforms (hardware/software) which was shaken the computer domain back in 70s, 80s and 90s. This project is entirely a Non-Profit and I am spending my own capital to triumph this project. If anyone willing or wish to contribute this national mission, feel free to contact me and you can be a part of our team and/or also can contribute with vintage hardware, software, books or whatsoever associated computer resources to 70s/80s and 90s. I firmly do not wish to take any of monetary/financial support or provision from any such organization or individual. This project is solely dedicated to my beloved motherland "SRI LANKA"...!!![..: PROUD TO BE SRI LANKAN :..]Thank YouDr. Sameera de Alwis[CONTACT ME: +94-712-477-284 or (sameera@hackimpact.com)]You can download project proposal here in PDF (file format). [AVAILABLE SOON]
-
Senior Principal Consultant - Cyber Security And Cyber IntelligenceSumathi Information Technologies Aug 2019 - Aug 2020Colombo 03, Western, LkHigh-Tech System Exploitation/Penetration Testing, Automated/Manual Vulnerability and System Defect Analysis, Device Specific Network and Security Audits (Firewall/IDS/IPS, VPN/HSM, Manhunt/Mantrap, Syslog/Honeypot, Wireless/Router/Switch/NAC Devices, etc.), Smart Systems/Portable or Mobile Device Penetration Testing and Vulnerability Analysis (IoT, AoT, SoT, and WoT), Cyber-Crime/Digital (Electronic Crime) Investigations/Forensics, High-Tech Cyber Intelligence and Surveillance/Cyveillance Services, Cyber-Law, Computer/Electronic Crime Jurisdictional Services, High-Tech Data Sanitize for Electronic Wastes (E-Wastes), Secure Data Wiping/Zapping, Digital Shredding Services (BHMG IS5-BS/ES, NAVSO P-5239-26, USAF SSI 5020, US DoD UHDD/5220.22-M, Peter Gutmann, GFOIS, CN ITSG-06, NIST SP-800-88 and REV.1, NSA/CSS SDDM, AGICTM-2014, and NZSIT 402 Based Advanced Algorithms), Advanced Threat Intelligence/Sophisticated Threat Mitigation Service for Fileless Malware, APT (Advanced Persistent Threats), Botnets, Hybrid Covert Malware, Ransomware, Advanced Bootkit/Rootkit Infections, Stealers (Against Covert Mode Silent Data Infiltrate/Exfiltrate Attacks), OnDemand Persistent Malware (Trojan/Spyware/Keylogger, etc.), and Sophisticated Malformed USB Attacks (Bad-USB, Rubber-Duck, Hardware Keyloggers, etc.), High-Fidelity DoS (Denial of Service) Attack Mitigation Services (Evade from DoS/DDoS/RDoS/TDoS and Specific Agent Based Malformed Threats (Zombies/Botnets, and Trojan Horses), Private Investigation and Digital/Cyber Defense Contracting Services, Military-Grade Cyber/Information Defense Solutions, Superior Grade Information (InfoSec)/High-Tech Network/Cyber Intelligence and Cyber Security Corporate Educational Services and Hands-On Bootcamps/Awareness Workshops for Enterprise/SOHO, and SME Businesses, and Highly Sophisticated Enterprise-Military Grade (Ultra Secured and Ultra Performance) Data Transfer Systems Planning and Implementations for Corporate/Enterprise Businesses. -
Head Of Operations - Cyber Security And Cyber IntelligenceSumathi Information Technologies Jan 2019 - Aug 2019Colombo 03, Western, LkProduct Specific Network and Cyber Security Considerations (Cisco, Microsoft, Linux/UNIX, Android, Solaris, IRIX, iOS, IOS, and MacOSX), High-Performance Cyber-Security and Managed Cyber Security Services and Solutions, ISMS and Compliance InfoSec Audits (ISO, GDPR, DISA, PCI-DSS, NIST, FIPS, OWASP, SANS, SafeTAG, Security on TOGAF, and DoD 8570.01-M, etc.), Universal Data Recovery and High-Tech Password Recovery Services, On-Device Local/OnDemand Remote Device Hardening, High-Tech Ethical Hacking Services, Business/Competitive Intelligence and Business Espionage Solutions, Tactical Physical Defense Services with Spy-Cam Embedded Solutions and Unmanned Vehicle (For Combatting Robots, UGV, UAV (Drones)) Based Anti-Disaster Mitigation Solutions, Self-Governing Tactical Enterprise Grade Emergency Readiness and Incident Mitigation Services (Enterprise CIRT/CERT, Red Team, Blue Team, Purple Team and Tiger Team Formation), Exclusive Grade BCP (Business Continuity)/DRP (Disaster Recovery) and High-Tech DLP (Data Leak Prevention) Solutions, Exclusive Grade Device Performance/Health, and Configuration Enhancement Audits (To Adjust Optimal Settings for Maximum Sustainable Device Throughputs on Every Network/Server, Security or Hardware Device), Self-Governing Vulnerability Management and Vulnerability Assessment Services, Highly Advanced Social Engineering/Reverse Social Engineering with Spear Phishing and Sophisticated Information Reconnaissance/Human-Being Targeted Attack Audits, High-Performance and Highly Secured NOC, SOC, ROC, Conventional or Cloud Based DR/Data Centers Blueprinting and Establishment, Optimized Software Security Architecting and High-Specific Software Security Code Audits, Tight Security Implementation for Cryptocurrency Pharming and Mining Operations/Advanced Security Implementation for Legal Electronic Coin/Legal and Ethical Money Laundering Businesses, Advanced and Custom Mode Onion Based Anonymity, and Shadow/Stego Data Transmission in Plain Sight. -
Senior Lecturer - Computer Systems And Networking (Greenwich University – Uk)University Of Greenwich Feb 2018 - Oct 2019Greenwich, London, GbPIBT - Greenwich University – UKBSc (Hons) Computer Systems and Networking (Greenwich University – UK) https://www.gre.ac.uk/ug/ach/g404http://www.pibtsl.com/bsc-hons-computer-systems-networking/http://www.pibtsl.com/wp-content/uploads/2015/02/BSc-Hons-Computer-Systems-Networking.pdfThe BSc (Hons) Computer Systems & Networking is designed for individuals wishing to pursue careers as networking professionals. Students work with the latest technologies to develop a sound theoretical understanding and in-depth practical experience of advanced networking, including cutting-edge developments in mobile computing. They will also acquire expertise in the design and management of modern distributed computer systems using the latest software and development technologies. All students on the degree are automatically enrolled as student members of the British Computer Society (BCS) and the Institution of Engineering & Technology (IET), the chartered bodies responsible for establishing and maintaining technical and ethical standards in the profession.Core Module:COMP1561: Network Security -
Lead Advisor, Lead Computer/Cyber/Net Forensics Investigator [High-Tech Crime Investigation Unit]Hackimpact Digital Defense And Forensics Allianz Sep 2014 - Sep 2019Tel-Aviv, Gush Dan, IlINVESTIGATION ARENAS:- Social Media (Facebook, LinkedIn, Google+) & Social Network- Search Engine/SEO Bot, Leecher/Tracker (Torrent), Spidering & Crawler - Cloud & Virtualization (Hyper-V, VMWare, VirtualBox etc)- e-Commerce, m-Commerce, e-Money & Bitcoin- Botnet, Darknet, DDoS & APT- Protocol & Kernel Forensics- Anonymizer Forensics (TOR, VPN, HIDE IP, Anon-Proxy, StealthSurf, Hotspot Shield etc)- Volatile (NAND, RAM, BIOS & EEPROM etc)- HSM (Hardware Security Module - Thales, Safenet, Futurex, Swift, CREN etc)- Reverse Engineering/Crack Forensics- Cryptography/Cipher (RSA, AES, MD5, SHA1 etc) - Router/Switch & Network Equipment- Sandbox & SheepDip Forensics - I/O & Hardware Devices- Mobile App (iOS, BB, Win, Android)- Cyber Forensics (WebApp)- Digital Device (Electronic, Mechatronics etc)- Wave (TV, RadioLinks, Walkie-Talkie, Push-to-Talk etc)- Mobile Phone (EDGE/2G etc)- Satellite and Radio (DVB, VSAT, HAM etc)- GIS/GPS (Google/Terrain Maps, GeoSAT etc) - Telecom & Datacom (ADSL, Radio Link, Telephone etc)- Wireless Device (Wi-Fi, 3G/4G, WCDMA, HSDPA etc)- SMS, Pager, Fax & Telex etc- Smart Device (Tabs, SmartPhones, PDA etc)- Wearable Technology (SmartWatch, Google Glass etc)- Removable Device (USB, CD/DVD/Blu-Ray etc) - Embedded Device (Raspberry PI, Arduino, ZigBee, XBee etc)- Multimedia (Voice/Audio Restorations)- Digital Photographic/Image- OS Forensics (Windows, Unix, Linux, MacOSX, OS/400, IRIX, Solaris etc)- Mobile OS (WinRT, Android, iOS, BlackBerry RIM, Mob-Linux etc)- Web Browsers & Offline Data Files- Binary, ASCII & Hex Files- Intrusion (Hacking)/Malware & Malcodes- Internet, Email & Instant Messenger (IM)- VoIP, VoD (Video on Demand) - Streaming Media (Skype, Google Talk etc)- Gamer Device (XBox360, Nintendo, PlayStation etc)- DRM (Digital Rights Management)- Physical Perimeter & Crime Scene Investigations- Patent, Copyright & Intellectual Property Advisory- Computer/Cyber Law (International/Local) Advisory -
Ceo/Info-Sec Consultant, Researcher/Scientist, Legal Advisory, Computer/Cyber Forensics InvestigatorHackimpact Digital Defense And Forensics Allianz Dec 2010 - Sep 2019Tel-Aviv, Gush Dan, IlReverse Code Engineering encompasses Multi-platform Assembly Language Development, Software Security Concepts and Solutions, Software Core Architecting, Web Technology security, Operating System Reverse Engineering, Shell Scripting, Programming Language Compilers Researching and Reversing, Emulation Design for Multiplatform, Computer Viruses, Worms, Trojans, Rootkits, Exploits, Shell-Codes, Bootkits, Botnets, APT (Advanced Persistent Threats) and Malware Research, Exploits Developments, OS Architectural Developments, Research and Development on Application Weaknesses (Vulnerabilities) and OS Weaknesses, Reverse engineering on Multi-Platform file systems, Antivirus Software Development, Encryption Technologies and Compression Technologies Research, Data packetize Research and Packet Crafting Mechanisms/Manipulations, Artificial Intelligence Software and Virtual Reality application technologies development, Operating systems device drivers (Kernel Level) and Internals Development, OS Kernel Architectural development, OS Shell Customization, OS Shell Codes, Exploits, Rootkits, Backdoors, Viruses and Spyware Developments, Revealing with Countermeasures.HackImpact is the only organization who can launch massive thunderbolt DDoS, RDoS, DRDoS, APT and Spear-Phishing attacks with the provision of Bot-Nets to simulate the real hackers or attackers’ impact. We have Pre-Developed Custom Black-Hat tools for both heterogeneous platforms for the security testing. Most of the time we develop our security tools with the Assembly Language, C++, Python, Ruby, Lua, TCL and Delphi etc. We are the only organization in the APAC region who could simulate the real Black-HAT attacks with the provision of the aforesaid tools. We do VAPT with full automated White-HAT testing, Non-Technical hacking attacks comprising social engineering and supplementary efforts. We can test the web site or any remote network with the appropriate access or we can also launch the blind attacks. -
Independent Digital Forensics Technology Consultant/Legal AdvisorHackimpact Digital Defense And Forensics Allianz May 2015 - Dec 2018Tel-Aviv, Gush Dan, IlExclusive Consultancy Pitches: - Highest Gauge Computer and Cyber Forensics- Extreme Malware Forensics and High-Tech Crime Investigations- Modern Cyber Threat and Persistent Malware Threat Forensics- Cyber-Warfare/Cold-War Impact Mitigation and Normalizing Tactical Forensics- Extreme Digital Device Forensics- Legal Jurisdictions on Cyber/Digital and High-Tech Crimes- Lawful Prosecutions for Cyber/Computer and High-Tech Digital Crimes- Red-Team and Blue-Team Cyber Security Advisory- Consultation for CERT Advisory Team Reforming and Fine-Tuning - CIRT Advisory Team Formations for Numerous Multinationals/Domestic Private Establishments - Digital Criminal/Forensics Pathological Science - High-Tech Cyber-Criminology and Digital-Criminology- Illicit Mass Cyber-Social and Illegal Social Media/Social Network Movements- Illegal Digital Web-Money/Web-Currencies Associated Crime Inquiries- Dark-Net/Dark-Web Associated Crime Investigations- Computerized Healthcare Oriented Digital Crime Research and Facility Design- Mutual Legal Assistance for Computer/Cyber Crimes- Formation of Law Enforcement Policies and Procedures - Paralegal Team Lawful Assistances for Law Enforcements -
Penetration Tester (Scada Platforms (Siemens), Enterprise Level Erp(S) - (Sap/Microsoft Dynamics))Hackimpact Digital Defense And Forensics Allianz Jun 2014 - Dec 2018Tel-Aviv, Gush Dan, IlStarted Vulnerability Research and Enterprise Penetration Testing on subsequent Enterprise Systems,Key References,SCADAhttp://en.wikipedia.org/wiki/SCADASiemens SCADA - http://www.automation.siemens.com/mcms/human-machine-interface/en/visualization-software/scada/pages/default.aspxOther SCADA Platformshttp://www.motorolasolutions.com/US-EN/Business+Product+and+Services/SCADA+Systemshttp://www.ge-ip.com/products/proficy-hmi-scada-cimplicity/p2819http://www.waterfall-security.com/category/products/scada-protocols/http://www.schneider-electric.com/products/ww/en/6000-telemetry-remote-scada-systems/http://www.copadata.com/en/products.htmlhttp://www.servelec-semaphore.com/products/scada-systems-scada-rtu.phphttp://www.osii.com/solutions/products/scada.asphttp://www.novusautomation.com/site/default.asp?TroncoID=621808&SecaoID=819191&SubsecaoID=0http://www.romteck.com/ScadaProducts.htmlhttp://www.securecrossing.com/our-products/https://www.honeywellprocess.com/en-US/explore/products/control-monitoring-and-safety-systems/scada-systems/Pages/experion-scada.aspxhttp://www.yokogawa.com/scd/scd-scada-index-en.htmSAP ERPwww.sap.com/pc/bp/erp.htmlwww.sap.com/pc/bp/erp/software/overview.htmlMicrosoft Dynamics NAV CRM/AXhttp://en.wikipedia.org/wiki/Microsoft_Dynamics_NAVhttp://www.microsoft.com/en-us/dynamics/default.aspx -
Independent Researcher (Icap Integration To Cisco Subsystem/Core Architecture) For Perimeter DefenseHackimpact Digital Defense And Forensics Allianz May 2014 - Dec 2018Tel-Aviv, Gush Dan, IlReferences and Introduction,http://en.wikipedia.org/wiki/Internet_Content_Adaptation_ProtocolIn my research, I am focusing on implementation of Cyber-Traps (Custom Coded), Ingress-Egress Filtering (Firewalls), Anti-Malware, Manhunt and Mantraps (IDS(s)/Honeypots) and Decoy/Lure Environments at the Edge Router Level.Research Paper Available Soon -
Digital Defense And Info-Sec Contractor, Consultant And Senior LecturerHackimpact Digital Defense And Forensics Allianz Sep 2011 - Dec 2018Tel-Aviv, Gush Dan, IlSmart Power-Grid and Siemens SCADA Platform Security, Nuclear Fusion Reactors (Digital Security) and Lecturer (Extreme Custom made Exploits Development, Vulnerability Discovery, Code Analysis, Advanced Malware Techniques and Remote/Local Arbitrary Command Execution on numerous segments of the Network/Internetwork Devices (Heap, Stack and Buffer OverFlow/UnderRun), Low Level Debugging, Disassembling, Decryption of Encrypted Code Stubs, Decoding the Crypted Data etc... -
Ceo/Snr. Info-Sec Consultant, Legal Advisory, Computer/Cyber Forensics InvestigatorHackimpact Digital Defense And Forensics Allianz Jan 2010 - Dec 2018Tel-Aviv, Gush Dan, IlMy proficiency contextual encompasses with Information security management, Security Policy development and implementation, Business Continuity (BCP) and Disaster Recovery (DRP) planning, Intrusion Detection/Prevention engineering and implementation, Perimeter Security Device administration consulting and training, Incident handling and reporting procedures, Physical and Environmental security management, System, LAN/WAN engineering and implementation, Strategic and operational planning, Quality and performance improvement management, Security awareness training, Large Enterprise Systems Integrator/Technology Consulting Firm/Security Trainer/Lecturer, Senior technical lead on multiple security planning, assessment, and implementation projects including Information Security Audits, Ethical Hacking, BlackHat Security Testing (Black-box), Penetration Testing, Vulnerability Assessments (White-box), Systems Audits.Also Cyber/Computer Forensics, SEO, Operating Systems (OS) Hardening, Firewall, Intrusion Detection Systems, Intrusion Prevention Systems Bypass techniques, Internet and Network Security, Attack Method Planning/Attack Sophistication Planning, Planning Network Security Strategies, principles policies and procedures, Security Implementation for Mobile Technologies, Source Code Auditing, Safe Wireless/Wi-Fi Engineering, Fuzz Engineering, Digital Forensics, Anti-Forensics, High Performance/Ultra-Extreme Secured Network Designing, Military Grade/Campus Ultra Powerful/Secured Network Planning/Designing, Honeypots/Honeynets (Decoy Systems), Virtualization Security, Cloud Security, SmartGrid Security, Mobile Computing Security, PowerGrid Security, Distributed/Clustered Security, Physical/Environmental Security, Green/ECO Computing and Security, Safe Syslog and Enterprise/Centralized Log Correlation Systems Designing, Attack Forensics, Penetration Testing, Auditing, Vulnerability Assessments, Incident Response Management, Universal Data Recovering, Disaster Recovery. -
Independent Senior Consultant/Advisor For Foreign Intelligence And Counterintelligence SurveillanceHackimpact Digital Defense And Forensics Allianz Mar 2016 - Oct 2018Tel-Aviv, Gush Dan, IlIndependent Consultant/Advisor for Foreign Intelligence/Counterintelligence Surveillance (Judicial Electronic Interceptions/Espionage) Mass Surveillance of Global Intelligence Community (GIC)Expertise in USA/UK-Europe Governing Intelligence Acts: - Foreign Intelligence Surveillance Act (FISA)- FISA Amendments Act (FAA) - Foreign Intelligence Surveillance Court (FISC)Surveillance Program Operated Pursuant to: :Section 702, 105, 703, 704, 705/b, 402 (PR/TT), 215 (BR FISA), and 214 :Defense Regulation 5240, Wiretap Act, Counter-Proliferation (CP) :Presidential Policy Directive 28 (PPD-28), UKUSA Agreement :Five Eyes (FVEY), 6 Eyes, 9 Eyes, and 14 Eyes :Special Procedures Governing Communications Metadata Analysis (SPCMA) :Transit Authority, Pen Register, Trap, and Trace Authority :Classified Annex Authority (CAA) and Upstream/Bulk Collection - Security Service Act (SSA)- FISA Amendments Act Reauthorization Act (FAARA) - National Security Surveillance Act (NSSA)- Investigatory Powers Act (IPA)- Regulation of Investigatory Powers Act (RIPA)- Intelligence Services Act (ISA)- Counter-Terrorism Act (CTA)- Data Protection Act (DPA)- Foreign Intelligence Surveillance Improvement and Enhancement Act (FISIEA)- Protect America Act (PAA)- Electronic Surveillance Modernization Act (ESMA)- USA FREEDOM Act (UFA)- Freedom of Information Act (FOIA)- Executive Order EO 12333/13587/13354 and 13388 (SIGINT (Signal Intelligence) Activities) -
Independent Researcher (Cisco Sinkhole Router For Malware Mitigation - Blackhole Filter) For Isp-SecHackimpact Digital Defense And Forensics Allianz Apr 2014 - Oct 2018Tel-Aviv, Gush Dan, IlReferences and Introduction,http://en.citizendium.org/wiki/Sinkhole_(Computer_network)http://www.cisco.com/web/about/security/intelligence/worm-mitigation-whitepaper.htmlResearch Paper Available Soon -
Senior Lecturer/ConsultantHackimpact Digital Defense And Forensics Allianz Feb 2011 - Oct 2018Tel-Aviv, Gush Dan, IlEthical Hacking, Cyber Security, Computer Security, Assembly Language, B.Sc. IT, MBA, DBA, Ph.D., Computer Forensics -
Blackhat Seo (Search Engine Optimization) Tech-Lead And ScientistHackimpact Digital Defense And Forensics Allianz May 2014 - Aug 2018Tel-Aviv, Gush Dan, IlLow-Level, Hostile and Potent Search Engine BOT Hacking Tactics, Tactical Search Engine Optimization Architectural Attacks to Core Search Engine BOT(s), Hacking Mass Search Engine BOT(s) such as Google Web Crawler BOT and Bing Leecher BOT, .HTACCESS Search Engine BOT Manipulation, ROBOT.TXT Based Search Engine BOT Hacking, Forceful HTML Meta-Tag Injections to Search Engine BOT(s), Blackhat Forceful Python, Lua, PHP, ASP.NET and Ruby(Rails) Remote Code Injection for Search Engine Guide BOT(s).... -
Senior Lecturer (Computer Low-Level Programming And System Low Level Coding)Hackimpact Digital Defense And Forensics Allianz Jan 2010 - Feb 2016Tel-Aviv, Gush Dan, IlUnix 32/64 bits (x86-x64) Assembly Language - Workstation/ServerLinux 32/64 bits (x86-x64) Assembly Language - Workstation/ServerMicrosoft Windows 32/64 bits (x86-x64) Assembly Language - Workstation/Server Sun Solaris 64 bits (x64) Assembly Language - ServerApple MacOSX 32/64 bits (x86-x64) Assembly Language - Workstation/ServerGoogle Android 32 bits Assembly Language - Embedded Device and Smart PhonesBorland Native C++ and C++ Builder XE5Borland Native Delphi and Delphi XE5LUA - www.lua.orgTCL - www.tcl.tkRuby - www.ruby-lang.orgPython - www.python.orgPerl - www.perl.orgCygwin - www.cygwin.comCGI - www.w3.org/CGI/DJango - www.djangoproject.com -
Senior Lecturer And Senior Education Consultant (Cyber/Computer Security And Digital Forensics)Hackimpact Digital Defense And Forensics Allianz Jan 2013 - Nov 2014Tel-Aviv, Gush Dan, IlTrained officials (Solicitors/Lawyers) from Courts of Sri Lanka for Digital (Computer/Cyber Forensics) Investigations, Cyber/Computer and Information Security - Official training program and course conducted by University of Colombo and AIMS College International - Colombo. -
Independent Researcher (Darknet(S), Apt(S) (Advanced Persistent Threat) Clusters And Ai Botnet(S))Hackimpact Digital Defense And Forensics Allianz May 2014 - Oct 2014Tel-Aviv, Gush Dan, IlI was authoritatively consigned to ensue through the research segment of subsequent Attack Vectors,1). DarkNet(s)-(File Sharing) - http://en.wikipedia.org/wiki/Darknet_(file_sharing)2). APT(s) - http://en.wikipedia.org/wiki/Advanced_persistent_threat3). BotNet - http://en.wikipedia.org/wiki/Botnet -
President/Ceo, And FounderHi-Cyber Campus Online Aug 2015 - Aug 2019Negombo, Western, Lk[Welcome to HI-Cyber Campus Online ("GET CERTIFIED FROM THE QUALIFIED")] - The Only Fully Virtualized Cloud Based Campus in Pacific Cyberspace (Proudly from Motherland Sri Lanka - Host Power from Israel) - Powered with Ultimate Cisco and BlackBerry Enterprise Cloud based fully Virtualized Facilities. We initiated our premier grade of fully online educational business in last month on Sri Lankan and Pacific Cyber-Space. We use an innovative model to conduct lectures and almost everything is virtualized except dispute resolution such as legal office (paralegal) and management office. Most courses are currently not available in Sri Lanka and some are not even advertised in APAC, SAARC regions. We take most of foreign passionate qualified veteran lecturers directly from all over the world such as USA, Canada, UK, Austrailia, Russia, etc. and local lecturers directly from various diverse geographical locations within the landmass of Sri Lanka. We engineered these ultra-modern innovative techniques for the first time in the history in Sri Lanka. We conduct premier grade of Technical and Non-Technical educational courses such as Professional Global Certifications, recognized and customized Diploma Courses, and Interim Courses including Corporate Training, etc. Please contact us for any educational query. [www.hicybercampus.net] is the TLD for HI Cyber-Campus. For any query, please send us an email over - info@hicybercampus.net or use the embedded email form for the query. WE WILL CONVERT YOURSELF "ZERO TO HERO"... -
President/Private Detective/Special Agent: Cid [High-Tech Crime Investigation Division/Intelligence]Cyber Forensics [Attorney] Aug 2015 - Aug 2019- Lawful Interception Device Hardware/Software- Corporate/Private Professional Detective Services- Digital Financial, Bank, & Insurance Crimes/Frauds- Spy Products & DRM Solutions- Pre/Post Employee Verification Services- Record Search & Verifications Services- Missing Person Detective Services- 419 Email Related Frauds/Scams (Ex. Nigerian)- Patent, Copyright & Intellectual Property Advisory- Computer/Cyber Law (International/Local) Advisory- Illicit Money Laundering & Counterfeit/Fraudulence Transactions- Phishing/Spear (Web/Email) Phishing Forensics- Under Cover Operation Detective Services- Darkweb, Darknet, and Deepweb Forensics- Social Media/Cloud Forensics- e-Commerce, m-Commerce, e-Money & Bitcoin Forensics- Surveillance Detective Services- Pre/Post Matrimonial Investigations- Data Theft/Loss, Destruction, & Pilferage Detective Services- Cyber Forensics and Digital Device Forensics- Labor Cases, Corporate Intelligence, Business Intelligence- SIGINT (Signal Intelligence) for Wireless/Satellite (GIS/GPS) - Audio/Video Surveillance & Video/Audio Monitoring - Phone Surveillance (Standard/Digital (Wire-Tapping/Eavesdropping)) - Telephonic/Media & Cyber-Harassment Investigations- Handwriting Authentication and DNA Testing Services- Consultancy for Business Promotions and Market Survey etc- Professional Advices for Personal Matters and NRI Services - Multimedia (Voice/Audio and Video Restorations)- Digital Photographic/Image Restorations- Assets/Wealth Verification Services- Teenage/Child Monitoring, & Tracing Individual- Copyright & Patent (Intellectual Rights/Trade-Secrets) Solutions- Intrusion (Hacking)/Malware & Malcode Forensics- Alimony/Divorce Case Investigations- VoIP/VoD (Streaming Media) Investigations- Child Custody/Maintenance & Shadowing Legal Advices- Family Court Cases/Civil Cases Investigation- Dating Scams, Child Pornography, & Cheating Partners Detectives - Physical Perimeter & Crime Scene Investigations -
FounderDefcon-Dc9411 [Colombo - Srilanka] Apr 2018 - Apr 2019Colombo, Western, LkI am the initiator and the founder of DEFCON [Sri Lanka] (The Largest Hacking Conference) and we are the registered (official) DEFCON initiative in Sri Lanka under the worldwide channel of DEFCON (DEF CON Communications, Inc - https://www.defcon.org/ and received the ID of DC9411 - Sri Lanka),[https://www.defcongroups.org/dcpages-int.html] This mammoth event will be held in this year final quarter in Colombo. We will show the real-world serious live hacking dojos and amazing digital black magic and cyber-voodoos as such spectacular things in this event and this is gonna be a phenomenon shocking experience and the biggest offensive real-world hacking event in APAC region and entire nation/state of Sri Lanka. Every military, intelligence, law-enforcement, government, and private sector/corporate agency and entity will be invited. Social Profile: [https://www.facebook.com/pages/story/reader/?page_story_id=1868892169796984] More Info: [https://www.facebook.com/permalink.php?story_fbid=1868934296459438&id=1868840913135443] FQDN: (Under Construction) [https://www.defcon.lk], Official Logo: [https://www.facebook.com/media/set/?set=a.1868840969802104.1073741825.1868840913135443&type=1&l=ccada3f00d], and more information - Please contact us over: info@defcon.lk or legal queries should be pointed to legal@defcon.lk (Mr. Dulith Jayasekara). Rest of information will announce soon.INTRO: The DEF CON (also written as DEFCON, Defcon, or DC) is one of the world's largest hacker conventions, held annually in Las Vegas, Nevada, with the first DEF CON taking place in June 1993. Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be "hacked." [Extract from Wikipedia - Copyright Reserved with Defcon Group Worldwide] -
Senior Lecturer, Senior Information Security Consultant And Computer/Cyber Forensics AdvisorCriminal Investigation Departments - Cyber-Crime And Digital-Crime Investigation Units (Police) Aug 2013 - Aug 2018I am one of the prominent educational consultant and advisor for Ethical Hacking, Cyber Security, Computer Security, Computer Forensics, Cyber Forensics and Digital Forensics for global forum of department of criminal investigations in the police departments (world-wide). I am rendering my services (opinion councilling and specific digital forensic cases opinion consullting) over remote access fully online multimedia tools.
-
Senior Lecturer - Cloud Security And Network SecurityLondon Metropolitan University Mar 2016 - Mar 2018London, GbEsoft - London Metropolitan UniversityBEng (Hons) in Computer Networking Top-Up (London Met – UK) https://www.esoft.lk/computer-studies/top-up-degree-programmes/beng-hons-top-up-computer-networking-london-met-uk/CC6004 – Network and Cloud SecurityFC6P01 – Project -
Senior Lecturer - Cisco Network Security (Ccna Security Academic Curriculum)London Metropolitan University Mar 2016 - Mar 2018London, GbEsoft - London Metropolitan UniversityBEng (Hons) in Computer Networking Top-Up (London Met – UK) https://www.esoft.lk/computer-studies/top-up-degree-programmes/beng-hons-top-up-computer-networking-london-met-uk/CT6004 – Network Security(Cisco)FC6P01 – Project -
Senior Lecturer - Computer Security (De Montfort University (Dmu), Leicester, Uk)De Montfort University Sep 2017 - Jan 2018Leicester, GbAuston - De Montfort University (DMU), Leicester, UKhttp://dmu.ac.uk/study/courses/undergraduate-courses/computer-security-bsc-degree/computer-security-bsc-hons-degree.aspxhttps://auston.edu.lk/bachelors-degee-science-computer-security/System Defence Strategies:Topics to be considered include Incident Response and Penetration Testing, considered to be key knowledge for a Cyber Security specialist. You will learn a range of skills and strategies to protect and defend the information systems within an organisation.This degree has a practical emphasis to prepare you for a career in computer security. You’ll study abuses of digital technology and learn the skills needed to investigate them. You’ll also complete exercises in computational theory and learn to interpret complex scenarios and explain them to non-specialists. You’ll understand how computer systems are designed and secured, and learn how to protect them against all kinds of attacks. Your studies will also cover effective computer systems management and how to complete an effective IT health check. -
Senior Lecturer - Computer Network Security (Birmingham City University – Uk)Birmingham City University Mar 2017 - Jan 2018Birmingham, England, GbAuston - Birmingham City University – UKBSc in Computer Network Security (Birmingham City University – UK) http://www.bcu.ac.uk/courses/computer-networks-and-security-bsc-hons-msci-2017-18https://auston.edu.lk/bachelor-of-science-computer-network-security/Core Modules:- Peresonal Identification and Authentication Systems- Individual Project -
Senior Lecturer And Senior Education Consultant (Cyber/Computer Security And Digital Forensics)Sri Lanka Police And Cid (Criminal Investigation Department) Sri Lanka Oct 2013 - Oct 2014Trained officials from Sri Lanka Department of Police and CID Sri Lanka for Digital (Computer/Cyber Forensics) Investigations, Cyber/Computer and Information Security - Official training program and course conducted by University of Colombo.
-
Head Of Information Security And Group Information Security ConsultantThe Capital Maharaja Organization Limited (Group Of Companies) Jan 2007 - Nov 2009Perimeter Security Architecting/Implementation of The Intranet/Extranet, High-Tech Digital Defense and Cyber Security Tactical Planning and Implementation, Digital Mass Media Security for Media Base-Stations, Data Loss Prevention of The Company's Critical Assets, Internal/Corporate Legal Prosecutions for Digital Policy/Procedure Violations, Detect/Remediate Disloyal Workforce Activities over The Digital Media, Digital Device and Information Systems Security, User’s Online/Offline Digital Assets/Privacy Protection, Internal User Activities Monitoring, Digital Wiretapping and Eavesdropping for Illicit and Suspicious Users, Mass Surveillance of Digital Media and CCTV as well as Associated Technology Implementation, Digital Media Copyright/Intellectual Property Advisory for Internal Legal Department, Corporate and Business Computer/Digital Criminal (Criminology) Law Advisory for The Internal Legal Department, Secure the Top-Tier Management's Digital/Information Assets with High-Tech Equipment/Techniques, Information Security Decision Making, Management and Information Security Project Management, Group Digital Security Recommendations, Consultations and Fiscal Budgeting for Digital Assets/Security Infrastructure, ISO 27001/27002 Standardization Audit for IT Department, Electronic Acceptable User Policy and Information Security Policy Implementation and Enforced Execution with The Top-Tier Management for The Entire Group, Digital Security, Information Security, Cyber Security and Allied Supplementary Security Related Issues Advisory, Remediation and Consultation for the Top-Tier Management.
-
Sl-Cert|Cc - Founder Member And Senior Information Security ConsultantSri Lanka Cert|Cc Jul 2005 - Aug 2008Bauddhaloka Mawatha, Colombo 07, LkEngaged as a Founder Member, Senior Information Security and Computer/Cyber Forensics Consultant and Trainer of Sri Lanka CERT|CC (Computer Emergency Readiness Team|Coordination Center). Exertions which was carried out throughout the period of engagement,- Setting-up the High Performance Internal Network Infrastructure (LAN/WAN and INTERNET) of CERT|CC- The High-Tech Perimeter Defense Blueprint/Infrastructure Setup of CERT|CC- The Total Information Security and Information System Infrastructure of CERT|CC- The Senior Information Security and Ethical Hacking Trainer (Trained the Internal CERT Staff) of CERT|CC- The Senior Computer/Cyber Forensics Trainer (Trained the Internal CERT Staff) of CERT|CC - Conducted the Systems Audit and Information Security Policies (Internal) of CERT|CC - Conducted the Vulnerability Assessment and Penetration Testing (Internal/External) of CERT|CCAt the transfer of the project to setting-up the Sri Lanka CERT|CC (Computer Emergency Readiness Team|Coordination Center), the ICTA rewarded and dispatched a sanctioned letter/certificate to express their honorable gratitude and it is attached with this post. -
Senior Systems Auditor, Penetration Tester And Senior Information Security ConsultantInformation And Communication Technology Agency Of Sri Lanka Aug 2005 - Mar 2008Colombo 03, LkEngaged as a Senior Information Security Consultant and Senior Systems Auditor of ICTA Sri Lanka (Information and Communication Technology Agency of Sri Lanka). Exertions which was carried out throughout the period of engagement,- Conducted the Deep Internal Systems Audit of ICTA - Conducted the Comprehensive Range of Deep System Vulnerability Assessment of ICTA- Conducted the Device and System based Performance Audit of ICTA- Conducted the Device and System based Configuration Audit of ICTA- Conducted the Device and System based Security Audit of ICTA- Conducted the Device and System based Compliance Audit of ICTA - Conducted the Comprehensive Penetration Testing (Internal/External) of ICTA - Advised and Consulted to Set-up the High Performance Internal Network Infrastructure (LAN/WAN and INTERNET) of ICTA - Constructed the High-Tech Perimeter Defense Blueprint/Infrastructure Setup of ICTA - Advised and Consulted to Set-up entire Information Security and Information System Infrastructure of ICTA - Transferred the Awareness (on Information Security Best Practices, Everyday Usage of the Computer and Online Systems etc.) for Internal Staff of ICTA At the transfer of the concluded project, the ICTA rewarded and dispatched a sanctioned letter/certificate to express their honorable gratitude and it is attached with this post. -
Information Security And Reverse Engineering ConsultantCnt - Ceylinco Network Technologies Jan 2003 - Dec 2006Business and Technical Continuity Planning and Disaster Recovery, High-Tech Digital Defense and Cyber Security Strategic Forecasting and Implementation, Perimeter Security Architecting/Implementation of The Intranet/Extranet, Corporate and Business Computer/Digital Criminal Legal Advisory for The Internal Legal Department, Secure the Top-Tier Board's Digital/Information Resources with High-Tech Equipment/Techniques, Information Security Decision Making, Management and Information Security Project Management, Digital Security Approvals and Abandon Assets Secure Sanitizing, Digital Security, Information Security, Cyber Security and Allied Supplementary Security Related Issues Advisory, Remediation and Consultation for the Top-Tier Management, Consultations and Financial Budgeting for Digital Assets/Security Infrastructure, User’s Online/Offline Digital Assets/Privacy Protection, Electronic Acceptable User Policy and Information Security Policy Implementation and Enforced Execution with The Top-Tier Management, Internal User Activities Monitoring, Digital Wiretapping and Eavesdropping for Illicit and Suspicious Users, Data Loss Prevention of The Company's Critical Assets, Surveillance of Digital Media and CCTV as well as Associated Technology Implementation, Internal/Corporate Legal Prosecutions for Digital Policy/Procedure Violations, Identify/Remediate Perfidious Workforce Activities over The Digital Media, Digital Device and Information Systems Security.
-
Information Security SpecialistEtpl (Enterprise Technology Private Limited) - A Member Of Bartleet Group Of Companies Jan 2001 - Nov 2003High-Performance Networking with Corporate System Integration, High-Tech Researches for New-Breed Technologies, Remediation and Consultation for the Top-Tier Management, Data Loss Prevention of The Company's Critical Assets, Business and Technical Continuity Planning and Disaster Recovery, Cyber Security and Allied Supplementary Security Related Issues Advisory, Customer/User’s Online and Offline Digital Assets/Privacy Protection, Electronic Acceptable User Policy and Information Security Policy Implementation and Enforced Execution with The Top-Tier Management, Digital Security Approvals and Abandon Assets Secure Sanitizing, Internal User Activities Monitoring, Digital Wiretapping and Eavesdropping for Illicit and Suspicious, Surveillance of Digital Media and CCTV as well as Associated Technology Implementation, Perimeter High-Performance Network Architecting, Security Architecting/Implementation of The Intranet/Extranet, Internal/Corporate Legal Prosecutions for Digital Policy/Procedure Violations, Identify/Remediate Perfidious Workforce Activities over The Digital Media, Digital Device and Information Systems Security, Corporate and Business Computer/Digital Criminal Legal Advisory for The Internal Legal Department, High-Tech Network, Internetwork, Digital Defense and Cyber Security Strategic Forecasting and Implementation of High-Tech Digital Assets for Customers and Company, Secure the Top-Tier Board's Digital/Information Resources with High-Tech Equipment/Techniques, Consultations Digital Assets/Network and Security Infrastructure, Networking, Internetworking, Information Security Decision Making, Management and Information Technology Project Management.
Professor. Sameera De Alwis Education Details
-
Mcafee InstituteCyber/Computer Forensics And Counterterrorism -
Aldersgate CollegeIt And Information Security -
Aldersgate CollegeInformation Security (Project Ravana) -
Specialized Task Oriented Product VendorsUtm And Supplementary Perimeter Defense -
Specialized Task Oriented Product VendorsUtm And Supplementary Perimeter Defense -
Specialized Task Oriented Product VendorsNoc/Soc Solutions And Hsm Solutions -
Specialized Task Oriented Product VendorsGeneric Information Security And Perimeter Defense -
Specialized Task Oriented Product VendorsMobile/Wireless Engineering And Telecommunication -
Nibm - National Institute Of Business ManagementComputer Science -
Gurukula College - Kelaniya - Sri LankaAnd Related Sciences
Frequently Asked Questions about Professor. Sameera De Alwis
What company does Professor. Sameera De Alwis work for?
Professor. Sameera De Alwis works for Icbt Campus
What is Professor. Sameera De Alwis's role at the current company?
Professor. Sameera De Alwis's current role is Senior Lecturer - Cyber Security.
What is Professor. Sameera De Alwis's email address?
Professor. Sameera De Alwis's email address is dr****@****oud.com
What schools did Professor. Sameera De Alwis attend?
Professor. Sameera De Alwis attended Mcafee Institute, Aldersgate College, Aldersgate College, Specialized Task Oriented Product Vendors, Specialized Task Oriented Product Vendors, Specialized Task Oriented Product Vendors, Specialized Task Oriented Product Vendors, Specialized Task Oriented Product Vendors, Nibm - National Institute Of Business Management, Gurukula College - Kelaniya - Sri Lanka.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial