Author Image

Hi, I am Othonas

Othonas Soultatos

Senior Software Engineer at BE-TSE

I am an R&D Engineer, devops and a Web developer. My interests are in the area of lightweight communication protocols and their implementation using different programing environments. Also my interests reside in security in communication protocols and web-based applications. I like developing using different languages and frameworks and I challenge myself to work outside of language/framework boxes.

Leadership
Team Work
Resourceful
Hard Working
Problem Solving
Communication

Education

Ph.D student in Model Driven Cyber Range Simulation at School of Mathematics, Computer Sciences & Engineering
B.Sc. in Computer Science

Skills

Experience

1
Senior Software Engineer
BE-tse

Aug 2022 - Dec 2022, Remote

Be Shaping The Future Sp. z o.o. have a proven position of being reliable partner for financial services organisations to analyse complex requirements, find solutions and implement them in their entirety, regardless of their complexity. A key success factor is the combination of IT know-how, nearshore delivery service efficiency, agility of implementations and excellent understanding of Financial industry, implemented by a team of specialists possessing all the skills required and who work to very high-quality standards.

Responsibilities:
  • Design and develop software with Go

Senior Software Engineer
Axiomatics

Apr 2022 - Jul 2022, Remote

Axiomatics is an innovative and pioneering software company focused on helping large organizations put Authorization first.

Responsibilities:
  • Design and develop software with Java (Spring Boot)
2

3
Software Engineer
Sphynx Technology Solutions (STS)

Apr 2020 - Mar 2022, Cyprus

SPHYNX offers products and solutions, and consulting services, in the areas of cyber intelligence, analytics, incident response, assurance, and certification.

Responsibilities:
  • Design and develop software with Java (Spring Boot) and golang.
  • Developing solutions for Authentication and Authorisation of the company’s platform.
  • Managing, Designing and Developing SPHYNX’s Asset Vulnerability Analysis and Vulnerability Propagation capabilities
  • Designing and writting software for EU Projects (Smart-Bear, Ascape) for FHIR data pseudoanonymisation.
  • Managing and contributing on SPHYNX’s AI4HealthSec EU Project
  • Contribution on SPHYNX’s EU Projects deliverables.
  • Provide Devops support for integrations of STS Security Assurance Platform at EU Projects Pilots.
  • Developing the simulation, scenario progression and backend mechanisms of SPHYNX’s Cyber Range
  • Assist in creation of training content for SPHYNX’s Cyber Range

Software Engineer
ICS-FORTH

Dec 2016 - Mar 2020, Vassilika Vouton, GR-700 13 Heraklion, Crete, Greece

The Institute of Computer Science (ICS) is one the six institutes of the Foundation for Research and Technology - Hellas (FORTH), a major national research center partly funded by the General Secretariat for Research and Technology of the Hellenic Ministry of Education and Religious Affairs

Responsibilities:
  • Developing secure, lightweight applications for networked heterogeneous embedded devices, using a variety of APIs and programming languages.
  • Developing applications for Software Defined Networks using Opendaylight Controller
  • Create and maintain websites for projects and conferences
  • Contribute to deliverables for EU projects
  • Devops engineering
4

5
Seconded Researcher
DGS

Oct 2019 - Jan 2020,

The entire organization of the DGS group is devoted to building added value in response to customer needs: reliability of results, robustness of solutions, constant support over time, listening ability for sharing objectives and assuming responsibility, are the frame in the delivery of each of our projects. Capability and experience in developing the best application and technology architectures are the pillars on which we build comprehensive services of designing, realizing and supporting complex information systems and infrastructures.

Responsibilities:
  • Contribution to H2020 EU Framework Programme (Marie Skłodowska-Curie) – EU funded project CyberSure

Seconded Researcher
BlueSoft

Apr 2019 - Aug 2019,

BlueSoft delivers IT bespoke solutions for companies around the globe – impacting millions of people since 2002. From our HQ in Poland and office locations in the US and the UK, we cater bespoke solutions to enterprises across multiple industries.

Responsibilities:
  • Contribution to H2020 EU Framework Programme (Marie Skłodowska-Curie) – EU funded project CE-IOT
6

7
Private - Analyst & Programmer
Hellenic Army

Jan 2016 - Aug 2016,

Responsibilities:
  • Military Service

Research And Development Engineer
Telecommunication Systems Research Institute

Jan 2015 - Sep 2015,

The Telecommunication Systems Research Institute (T.S.I.) is a Greek Government-sponsored independent Research Institute established by the Greek Ministry of Education in 1995. T.S.I. operates within the framework of the Technical University of Crete (T.U.C.); however, it is an administratively independent and financially self-sustained entity mainly funded by external research contracts and grants.

Responsibilities:
  • Implementing innovative security algorithms for embedded systems for Open Source Modelling and Hardware Software Codesign of Embedded Systems OSMOSIS
  • Security models development for simulator COSSIM on the scopes of project A Novel,Comprehensible,Ultra-Fast,Security-Aware CPS Simulator project number “COSSIM -Project No 644042”
8

9
Junior Researcher
Telecommunication Systems Research Institute

Oct 2014 - Dec 2014,

The Technical University of Crete is particularly active in conducting basic and applied research.The research and development projects, managed by the Research Committee, are funded by the European Union, the General Secretariat for Research and Technology, the Ministry of Education, the Region of Crete, local administration organizations and many private businesses. A large number of TUC undergraduate and postgraduate students are employed in these projects; in this way, they benefit from the best possible training and they familiarize with conducting research.

Responsibilities:
  • New embedded Systems arcHItecturE for multi-Layer Dependable solutions- nSHIELD" research project, co-funded by the ARTEMIS JOINT UNDERTAKING (Sub-programme SP6) focused on the research of SPD (Security, Privacy, Dependability) in the context of Embedded Systems. http://www.newshield.eu/

Projects

AI4HEALTHSEC
AI4HEALTHSEC
Project Manager Oct 2020 - Apr 2021

Assisted in the creation of the project architecture. Lead a Work Package and contributed in writing deliverables and assisting in the project dissemination

ASCAPE
Contributor Apr 2020 - Present

Integrated state of the art components in order to provide security and privacy. Developed software components that are responsible to pseudoanonymise FHIR compliant data.

SMART BEAR
SMART BEAR
Contributor Apr 2020 - Present

Platforms architecture and security related deliverables contribution. Responsible for the platforms security. Integrated state of the art components in order to provide security and privacy. Developed software components that are responsible to pseudoanonymise FHIR compliant data. Assisted in the devops.

SPIDER
SPIDER
Contributor Apr 2020 - Present

Focused on assisting the creation of the project architecture. Lead a Work Package and contributed in writing deliverables and assisting in the project dissemination.

COLLABS
COLLABS
Contributor Apr 2020 - Present

Focused on integrating the company’s platform in the projects platform at the pilot sites.

CE-IoT
CE-IoT
Contributor Jul 2018 - Mar 2020

Contribution to projects deliverables. Assisting in project dissemination and in writing publications.

CYBERSURE
CYBERSURE
Contributor Jan 2017 – Mar 2020

Contribution to projects deliverables. Assisting in project dissemination and in writing publications.

IDEAL-CITIES
IDEAL-CITIES
Contributor Jul 2018 – Mar 2020"

Contribution to projects deliverables. Assisting in project dissemination and in writing publications.

SEMIOTICS
Contributor Jan 2018 – Mar 2020

Contribution to projects deliverables. Assisting in project dissemination and in writing publications. Dissemination of the project in conferences.

VirtuWind
VirtuWind
Contributor Dec 2016 – Feb 2018

Focused on the development and demonstration of an SDN & NFV ecosystem, based on an open, modular and secure framework, showcasing a prototype for intra-domain and inter-domain scenarios in real wind parks as a representative use case of industrial networks.

COSSIM
COSSIM
Contributor Jun 2015 – Sep 2015

H2020 EU Framework Programme for Research and Innovation (H2020-ICT-2014-1 call). Focused on the design and implementation of a novel, comprehensible, ultra-fast, security-aware Cyber-Physical System simulator.

nSHIELD
Contributor Oct 2014 – Dec 2014

FP7 EU project (ARTEMIS-2010-1 call). Focused on the research of SPD (Security, Privacy, Dependability) in the context of Embedded Systems.

Twitterbot
Owner

A bot written for retweeting in order to further extend the dissemination activities of the EU projects that I participate. Written in go.

MobileTrust: Secure knowledge integration in VANETs
Co-Author

Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area….

Secure Semantic Interoperability for IoT Applications with Linked Data
Co-Author

Interoperability stands for the capacity of a system to interact with the units of another entity. Although it is quite easy to accomplish this within the products of the same brand, it is not facile to provide compatibility for the whole spectrum of the Internet-of-Things (IoT) and the Linked Data (LD) world….

The THREAT-ARREST cyber-security training platform
Author

Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST….

End-to-end semantic interoperability mechanisms for iot
Co-Author

Semantic interoperability is the designed property where various systems can interact with each other and exchange data with unambiguous, shared meaning. This enables knowledge discovery, machine computable reasoning and federation of different information systems…..

Pattern-driven security, privacy, dependability and interoperability management of IoT environments
Author

Achieving Security, Privacy, Dependability and Interoperability (SPDI) is of paramount importance for the ubiquitous deployment and impact maximization of Internet of Things (IoT) applications. Nevertheless, said requirements are not only difficult to achieve at system initialization, but also hard to prove and maintain at run-time….

Architectural patterns for secure IoT orchestrations
Co-Author

The vast amount of connected devices on the Internet of Things (IoT) creates an enormous potential for new applications, by leveraging synergies arising through the convergence of consumer, business and industrial Internet, and creating open, global networks connecting people, data, and “things”…..

Review of security and privacy for the Internet of Medical Things (IoMT)
Co-Author

Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay of CE with healthcare. Novel services, like remote sensing, assisting of elder people, and e-visit, enhance the people’s health and convenience, while reducing the per-patient cost for the medical institutions…..

WARDOG: Awareness detection watchbog for Botnet infection on the host device
Co-Author

Botnets constitute nowadays one of the most dangerous security threats worldwide. High volumes of infected machines are controlled by a malicious entity and perform coordinated cyber-attacks. The problem will become even worse in the era of the Internet of Things (IoT) as the number of insecure devices is going to be exponentially increased. This paper presents WARDOG - an awareness and digital forensic system…..

Review of security and privacy for the internet of medical things (IoMT): resolving the protection concerns for the novel circular economy bioinformatics
Co-Author

Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay of CE with healthcare. Novel services, like remote sensing, assisting of elder people, and e-visit, enhance the people’s health and convenience, while reducing the per-patient cost for the medical institutions….

Towards a security, privacy, dependability, interoperability framework for the Internet of Things
Author

A popular application of ambient intelligence systems constitutes of assisting living services on smart buildings. As intelligence is imported in embedded equipment, the system becomes able to provide smart services (e.g. control lights, airconditioning, provide energy management services etc.). IoT is the main enabler of such environments….

The Industrial Internet of Things as an enabler for a Circular Economy Hy-LP: A novel IIoT protocol, evaluated on a wind park’s SDN/NFV-enabled 5G industrial network
Co-Author, Protocol creator

Smart interconnected devices, including Cyber-Physical Systems (CPS), permeate our lives and are now an integral part of our daily activities, paving the way towards the Internet of Things (IoT). In the industrial domain, these devices interact with their surroundings and system operators, while often also integrating industrial cloud applications……

XSACd—Cross-domain resource sharing & access control for smart environments
Co-Author, Protocol creator

Computing devices permeate working and living environments, affecting all aspects of modern everyday lives; a trend which is expected to intensify in the coming years. In the residential setting, the enhanced features and services provided by said computing devices constitute what is typically referred to as a “smart home”….

Which IoT protocol? Comparing standardized approaches over a common M2M application
Co-Author

Computing devices already permeate working and living environments, while researchers and engineers aim to exploit the potential of pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will lead us eventually to the era of urban computing and the Internet of Things (IoT)…..

Secure and Authenticated Access to LLN Resources Through Policy Constraints
Co-Author

Ubiquitous devices comprising several resource-constrained sensors and actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living. Their intrinsic resource limitations however constitute critical requirements, such as security, a great challenge…..

Policy-based access control for DPWS-enabled ubiquitous devices
Co-Author

As computing becomes ubiquitous, researchers and engineers aim to exploit the potential of the pervasive systems in order to introduce new types of services and address inveterate and emerging problems. This process will, eventually, lead us to the era of urban computing and the Internet of Things; the ultimate goal being to improve our quality of life….

Website Portfolio

Organising Committee and Website Creator

R&D Engineer and Website Creator

R&D Engineer and Website Creator

Website Creator

Website Creator

Website Creator