About | Articles | Research | Resources
- Concepts of Information Security
- Leaderboard | Gopherchain | Drachmes | File split | Mcheck
Software Engineer and Information Security Specialist
I work on enterprise software and infrastructure.
June 2021 - Present: Chief Technology Officer, SkillGaming
September 2019 - June 2021: Senior Developer, Hatchworks
October 2014 - August 2019: Senior Software Engineer, Trust International Insurance
February 2012 - October 2014: Software & Systems Engineer, SMK IdealHost Ltd
January 2010 - January 2012: Software Engineer, Buytech Ltd
January 2008 - December 2009: Web Application Developer, Freelance
February 2007 - November 2007: Security Systems Technician, SAPELE Security Systems Ltd
1996 - 2000: Multinational School of Riyadh, Saudi Arabia
2000 - 2002: American International School of Riyadh, Saudi Arabia
Class of 2003: High School Diploma, American International School of Cyprus
2007 - 2011:BSc Computer Science, University of Nicosia
2011 - 2013: MSc Computer & Network Security - Upper Second Class Honours, Middlesex University
Violaris C. G., Mavromoustakis X. C. “On the Performance Evaluation and Analysis of the Hybridised Bittorrent Protocol with Partial Mobility Characteristics” Proceedings of The Second International Conference on Advances in P2P Systems (AP2PS 2010), October 25-30, Florence, Italy.
Charalambous M., Mavromoustakis X. C., Violaris C. G., and Muneer Bani Yassein. “On the Mobility Scenario Implementation Using a Graphical P2P Discrete Event Simulator for the Bittorrent Protocol”. Multi-Science Publishing, Journal of Algorithms and Computational Technology, Volume 7, Number 4, December 2013.
“Out-of-Band Authentication Model with Hashcash Brute-Force Prevention”. IEEE – The 6th International Symposium on Cyberspace Safety and Security. (CSS 2014) Paris, France, August 20 – 22, 2014. Violaris George, Dionysiou Ioanna.
Programming Frameworks: Laravel, Spring, Revel, CodeIgniter, Django, Node.js, Next.js, Vue.js, React
Databases: Oracle, Postgres, MySQL, MSSQL, MongoDB
Security: Metasploit, w3af, Nmap, Wireshark, Ettercap
Protocols: TCP/IP, JSON-RPC, REST, SOAP, AJAX
Operating Systems: RedHat, CentOS, Oracle Linux, Ubuntu Server, Windows 2008/2012/2016
Web Servers: Apache, Weblogic, Nginx, Tomcat, Glassfish
Environments: Docker, Vagrant, vmWare ESXi, Virtualbox