Anaximander Jehoshaphat

Anaximander Jehoshaphat

Cybersecurity Engineer & Consultant

CompTIA Security+ ITCHY® Foundation
12Years Experience
42Clients Served
87Promises Kept
Overall Trust Score93%
87 of 94 promises kept

Anaximander Jehoshaphat is a certified cybersecurity professional with over 12 years of experience in the IT and security field. He specializes in security assessments, infrastructure implementation, and incident response planning. His approach combines technical expertise with a focus on business objectives, delivering practical security solutions that enhance protection without hampering operations.

With a background in database management, network administration, and web development, Anaximander brings a comprehensive understanding of the entire technology stack to his security consulting work.

10
Security Domains
100%
Client Data Protected
15 min
Incident Response Time

Key Promises

24-Hour Vulnerability Reports

97% kept

I promise to deliver a comprehensive vulnerability assessment report within 24 hours of assessment completion.

security assessment
Verified by: Timestamp on report delivery compared to assessment completion log

Zero False Positives

94% kept

I promise that all critical vulnerabilities identified in my reports will be verified with proof of concept, with zero false positives.

vulnerability management
Verified by: Independent verification by client security team

Penetration Test Boundaries

99% kept

I promise to strictly adhere to the agreed-upon scope during penetration tests, never exceeding authorized boundaries.

penetration testing
Verified by: Test logs and boundary monitoring systems

Client Data Protection

100% kept

I promise to encrypt and securely delete all client data within 7 days of project completion.

data security
Verified by: Cryptographic proof of deletion with timestamps

Recent Projects

Mar 15, 2025
Completed security assessment for financial services client - All vulnerabilities documented with remediation plan
Mar 10, 2025
Implemented zero-trust architecture for healthcare client - Successfully passed compliance audit
Mar 5, 2025
Conducted security awareness training for manufacturing client - 97% staff completion rate

Security Services

Security Assessment

Comprehensive evaluation of your security posture including vulnerability scanning, penetration testing, and detailed remediation recommendations.

Security Architecture

Design and implementation of secure infrastructure including zero-trust networks, identity management, and encryption solutions.

Incident Response

Development of customized incident response plans, staff training, and simulated breach exercises to prepare for potential security events.

Compliance & Governance

Assessment and implementation of controls to meet industry standards and regulations including HIPAA, PCI-DSS, SOC2, and GDPR.

Secure Development

Code review, secure coding practices, and implementation of DevSecOps pipelines to build security into your software development lifecycle.

Security Awareness

Custom training programs to build a security-conscious culture through engaging workshops, phishing simulations, and ongoing education.

Verifiable Security Promises

Transparency is core to my practice. Below are the specific, measurable promises I make to clients, along with the verification methods used to prove fulfillment.

Loading Promise Tracker...

All Security Promises

24-Hour Vulnerability Reports

97% kept

I promise to deliver a comprehensive vulnerability assessment report within 24 hours of assessment completion.

security assessmentVerified by: Timestamp on report delivery compared to assessment completion log

Zero False Positives

94% kept

I promise that all critical vulnerabilities identified in my reports will be verified with proof of concept, with zero false positives.

vulnerability managementVerified by: Independent verification by client security team

Penetration Test Boundaries

99% kept

I promise to strictly adhere to the agreed-upon scope during penetration tests, never exceeding authorized boundaries.

penetration testingVerified by: Test logs and boundary monitoring systems

Client Data Protection

100% kept

I promise to encrypt and securely delete all client data within 7 days of project completion.

data securityVerified by: Cryptographic proof of deletion with timestamps

15-Minute Crisis Response

92% kept

I promise to respond to critical security incidents within 15 minutes, 24/7, for all clients on support contracts.

incident responseVerified by: Incident management system timestamps

Complete Compliance Documentation

97% kept

I promise that all security implementations will include complete documentation meeting relevant compliance requirements.

compliance achievementVerified by: Documentation completeness checklist and compliance validation

No Unexpected Downtime

91% kept

I promise that security implementations will not cause any unplanned system downtime.

infrastructure implementationVerified by: System monitoring logs and planned maintenance records

Effective Staff Training

93% kept

I promise that after security awareness training, at least 95% of staff will pass the simulation tests.

staff trainingVerified by: Test results and phishing simulation metrics

Verification Methods

Timestamp Validation

Cryptographically signed timestamps verify response times and deliverables

Client Confirmation

Signed client acceptance forms verify promise fulfillment

System Logs

Monitoring systems provide automated verification

Documentation

Detailed documentation proves implementation quality

About Promise Verification

I use the Agency Protocol verification system that allows clients to independently verify all promises. Each promise has specific, measurable outcomes and transparent verification methods.

Want to verify a specific promise? Click "Assess This Promise" in the Promise Tracker above.

Active Certifications & Verifiable Credentials

CISSP

Active

Certified Information Systems Security Professional

Advanced certification validating expertise in designing and implementing security programs across all 8 CISSP domains.

Issued: 2018-05-15
Expires: 2024-05-15

CEH

Active

Certified Ethical Hacker

Certification validating skills in identifying vulnerabilities, penetration testing, and attack vectors.

Issued: 2019-08-23
Expires: 2025-08-23

AWS Certified Security

Active

AWS Certified Security - Specialty

Validates expertise in AWS security services, protocols, and securing AWS infrastructure.

Issued: 2021-11-05
Expires: 2024-11-05

Client Success Stories

Comprehensive Security Assessment

Client: Finnicky Corp

KEPT

Deliverables & Evidence:

  • Vulnerability report
  • Network penetration test results
  • Remediation plan document
  • Client implementation verification
2025-03-15
Verified by: Independent Security Assessor
Stake returned

Zero-Trust Architecture Implementation

Client: Healthscare Provider

KEPT

Deliverables & Evidence:

  • Architecture design documentation
  • Implementation verification tests
  • Compliance audit results
  • Client acceptance document
2025-03-10
Verified by: HIPAA Compliance Officer
Stake returned

Security Awareness Training Program

Client: Manu-fracturing Inc.

KEPT

Deliverables & Evidence:

  • Training materials
  • Staff completion metrics
  • Phishing simulation results
  • Post-training security incident reduction metrics
2025-03-05
Verified by: Client CISO
Stake returned

Domain Expertise Tree

The following diagram shows my areas of expertise and how they relate to each other. Each domain includes specific promises and a track record of fulfillment.

Information Technology

/information_technology
96% merit
143/150 promises kept

Cybersecurity

/information_technology/cybersecurity
94% merit
87/94 promises kept

Security Assessment

/information_technology/cybersecurity/assessment
94% merit
34/36 promises kept

Security Implementation

/information_technology/cybersecurity/implementation
93% merit
28/30 promises kept

Security Operations

/information_technology/cybersecurity/operations
89% merit
25/28 promises kept

Ready to secure your organization?

Get in touch today to schedule a security assessment and discover how I can help protect your critical assets.