Executive IT Support Professional

I possess demonstrated ability to provide customer service & support C- level executives.

Umal Nanumura

Executive IT Support Professional

Greetings! I’m Umal, an accomplished Executive IT Support Professional in the UK. With over a decade of experience in the dynamic world of information technology, I bring a wealth of expertise in Systems, Network Management, & Enterprise IT Support to the table.

I pursued BSc.(Hons,) Computing at Wrexham Glyndwr University, United Kingdom from 2017 to 2019 & then I pursued a Master’s in Cyber Security at the University of South Wales, United Kingdom from 2021 to 2023

DSC09469
I am a solution-maker!

I Manage & Resolve Complex Technical Issues!

Recommendations
Umal Anuraga Nanumura and I worked in MAS Linea Aqua Pvt Ltd , for 8 years not in the same department but in the central plant with 4500 employees and he is one of the most talented young IT associate in our company. He is incharge to take care of my department IT requirement dealing with our 40 + customers like Victoria Secret, Philipp Van Husein ,Speedo and others using the software data analystics and the usage of technology to engage on our day to day activities with all Customers . 
Umal is a young technological enthusiast with a great taste to learn new things continuously and want him to be ranked high continuously among others. Great individual with a sense of humor and will not be bored with any team at any circumstances. I have worked with him for many years and can recommend for his commitment, dedication and the cooperation on any project you embark with him and I wish him well in his future endeavours.

Dilani Samanthika

Umal is a seasoned cybersecurity and networking specialist. I have known him for years. I have worked with him on numerous projects, and I can state that he is a trusted professional.

Blog

As an expert in the field of IT, I believe that raising awareness in the non IT community is my one of my key responsibilities. Depending on that objective, I started to share my knowledge & expertise in emerging trends in the IT sector via my blog. 

Stay tuned for more updates!

Umal has unveiled AI and Cybersecurity industry insights in the blog.
39

We are the lucky ones who live in the modern digital era. We have gone to the moon, building space stations in …

As we move into the digital age, we use Artificial Intelligence (AI) more and more daily. As a technology advancement leader, the …

Artificial intelligence (AI) started revolutionizing our world a while ago. Recent AI developments have brought AI to the top of the stage …

Check out my extensive collection of research and publications, where I unravel the complexities of cybersecurity to safeguard the digital realm. Discover how my expertise is shaping the future of online protection and fortifying the digital landscape.

In-Depth Analysis of Encryption Techniques for the Protection of Mobile Health Care Applications

Mobile healthcare applications, also known as mHealth apps, play an essential part in handling private patient information in today's healthcare system. In this article, the vital role that encryption plays in the process of data protection is investigated.

Wi-Fi Data Analysis based on Machine Learning

This study proposes using machine learning to improve Wi-Fi network security. As Wi-Fi networks spread from industrial to residential areas, the necessity for strong security has risen. The rise of smart networking, especially in the IoT, has created data security and vulnerability issues.

Enhancing Data Privacy of Medical Data through Encryption and Access Control

Electronic health records (EHRs) and the necessity for seamless information sharing across healthcare providers have made medical data management more complicated in the digital age. This study addresses the crucial topic of protecting medical data via encryption and access control.

Developing an Optimal Strategy to Address the Vulnerability of Image Tampering

Image tampering is a growing concern in numerous fields, necessitating robust solutions. This study investigates the creation of an optimal strategy to resolve the vulnerability of image tampering (manipulation)..

Including GRC Principles in IoT Security: A Comparison of Current Approaches and Future Prospects

With its ability to provide seamless communication between systems and objects, the Internet of Things (IoT) has completely changed the way we engage with technology.

error

Enjoy this blog? Please spread the word :)