Anaximander Jehoshaphat
Cybersecurity Engineer & Consultant
Anaximander Jehoshaphat is a certified cybersecurity professional with over 12 years of experience in the IT and security field. He specializes in security assessments, infrastructure implementation, and incident response planning. His approach combines technical expertise with a focus on business objectives, delivering practical security solutions that enhance protection without hampering operations.
With a background in database management, network administration, and web development, Anaximander brings a comprehensive understanding of the entire technology stack to his security consulting work.
Key Promises
24-Hour Vulnerability Reports
97% keptI promise to deliver a comprehensive vulnerability assessment report within 24 hours of assessment completion.
Zero False Positives
94% keptI promise that all critical vulnerabilities identified in my reports will be verified with proof of concept, with zero false positives.
Penetration Test Boundaries
99% keptI promise to strictly adhere to the agreed-upon scope during penetration tests, never exceeding authorized boundaries.
Client Data Protection
100% keptI promise to encrypt and securely delete all client data within 7 days of project completion.
Recent Projects
Security Services
Security Assessment
Comprehensive evaluation of your security posture including vulnerability scanning, penetration testing, and detailed remediation recommendations.
Security Architecture
Design and implementation of secure infrastructure including zero-trust networks, identity management, and encryption solutions.
Incident Response
Development of customized incident response plans, staff training, and simulated breach exercises to prepare for potential security events.
Compliance & Governance
Assessment and implementation of controls to meet industry standards and regulations including HIPAA, PCI-DSS, SOC2, and GDPR.
Secure Development
Code review, secure coding practices, and implementation of DevSecOps pipelines to build security into your software development lifecycle.
Security Awareness
Custom training programs to build a security-conscious culture through engaging workshops, phishing simulations, and ongoing education.
Verifiable Security Promises
Transparency is core to my practice. Below are the specific, measurable promises I make to clients, along with the verification methods used to prove fulfillment.
Loading Promise Tracker...
All Security Promises
24-Hour Vulnerability Reports
97% keptI promise to deliver a comprehensive vulnerability assessment report within 24 hours of assessment completion.
Zero False Positives
94% keptI promise that all critical vulnerabilities identified in my reports will be verified with proof of concept, with zero false positives.
Penetration Test Boundaries
99% keptI promise to strictly adhere to the agreed-upon scope during penetration tests, never exceeding authorized boundaries.
Client Data Protection
100% keptI promise to encrypt and securely delete all client data within 7 days of project completion.
15-Minute Crisis Response
92% keptI promise to respond to critical security incidents within 15 minutes, 24/7, for all clients on support contracts.
Complete Compliance Documentation
97% keptI promise that all security implementations will include complete documentation meeting relevant compliance requirements.
No Unexpected Downtime
91% keptI promise that security implementations will not cause any unplanned system downtime.
Effective Staff Training
93% keptI promise that after security awareness training, at least 95% of staff will pass the simulation tests.
Verification Methods
Cryptographically signed timestamps verify response times and deliverables
Signed client acceptance forms verify promise fulfillment
Monitoring systems provide automated verification
Detailed documentation proves implementation quality
About Promise Verification
I use the Agency Protocol verification system that allows clients to independently verify all promises. Each promise has specific, measurable outcomes and transparent verification methods.
Active Certifications & Verifiable Credentials
CISSP
Certified Information Systems Security Professional
Advanced certification validating expertise in designing and implementing security programs across all 8 CISSP domains.
CEH
Certified Ethical Hacker
Certification validating skills in identifying vulnerabilities, penetration testing, and attack vectors.
AWS Certified Security
AWS Certified Security - Specialty
Validates expertise in AWS security services, protocols, and securing AWS infrastructure.
Client Success Stories
Comprehensive Security Assessment
Client: Finnicky Corp
Deliverables & Evidence:
- Vulnerability report
- Network penetration test results
- Remediation plan document
- Client implementation verification
Zero-Trust Architecture Implementation
Client: Healthscare Provider
Deliverables & Evidence:
- Architecture design documentation
- Implementation verification tests
- Compliance audit results
- Client acceptance document
Security Awareness Training Program
Client: Manu-fracturing Inc.
Deliverables & Evidence:
- Training materials
- Staff completion metrics
- Phishing simulation results
- Post-training security incident reduction metrics
Domain Expertise Tree
The following diagram shows my areas of expertise and how they relate to each other. Each domain includes specific promises and a track record of fulfillment.
Information Technology
Cybersecurity
Security Assessment
Security Implementation
Security Operations
Ready to secure your organization?
Get in touch today to schedule a security assessment and discover how I can help protect your critical assets.