Highly experienced Computer Scientist with expertise in Financial Technology, Information Systems Auditing, Data Analytics, Digital Forensics, and Cyber Security.
I am a Computer Scientist with over 5 years of experience in the Finance industry, specializing in Financial Technology (FinTech), Information Systems Auditing, Data Analytics, Digital Forensics, Database and Software Transactions, Ethical Hacking, and Computer and Cyber Security.
Currently serving as a Fulltime Lecturer at Bentley University in Waltham, Massachusetts, I am passionate about educating the next generation of technology professionals while continuing to contribute to the field through research and consulting.
My objective is to obtain a crowning status in the technological industry as an efficient Computer Scientist and Cyber Security analyst, demonstrating apical skills and talents linked with the profile.
April 2023 - Present
Teaching & Curriculum Development: Deliver engaging lectures and facilitate interactive discussions on topics related to finance and FinTech. Mentor students in developing a deep understanding of financial concepts and their practical applications in the FinTech industry. Collaborate with colleagues to design and implement innovative curriculum enhancements that reflect the evolving landscape of finance and technology.
Program Development: Played a pivotal role in the development of the Master of FinTech program and the Master of Science in Finance – FinTech Track, collaborating with academic leaders and industry experts to shape core curricula, identify key competencies, and ensure alignment with current and emerging market demands.
Member of Executive Education Steering Committee: Contribute strategic insights and recommendations to enhance the quality and relevance of executive education programs. Participate in decision-making processes to align program offerings with industry trends and employer needs. Foster partnerships with industry leaders to provide students and professionals with valuable networking and career development opportunities.
Lead Fintech advisor for the Enterprenueral hub (E-Hub): Guide and support student entrepreneurs in developing and refining their FinTech innovations. Provide expert advice on market research, product development, and business strategy to help startups achieve their goals. Cultivate a collaborative and supportive environment that encourages creativity, critical thinking, and entrepreneurial spirit.
Faculty Advisor Roles (International Students Investment Club, Ghanaian Ancestry Student Association): Offering counsel on organizational leadership, strategic planning, and member engagement. Support student initiatives that promote financial literacy, cultural awareness, and inclusivity.
August 2022 - Present
Governance, Risk, and Compliance (GRC) Advisory: Provide expert guidance on governance frameworks, risk management strategies, and compliance initiatives tailored to clients' specific needs and industry regulations. Conduct comprehensive assessments of clients' existing GRC practices to identify areas for improvement and develop actionable recommendations for enhancement. Collaborate closely with clients' leadership teams to design and implement effective GRC programs that align with organizational objectives and mitigate potential risks.
Information Systems Audit: Perform thorough evaluations of clients' information systems, including hardware, software, networks, and data management processes, to ensure compliance with industry standards and regulatory requirements. Conduct risk assessments and penetration tests to identify vulnerabilities and weaknesses in clients' IT infrastructure and recommend remediation measures to strengthen security controls. Prepare detailed audit reports documenting findings, risk exposures, and recommendations for management's review and action, highlighting areas of concern and opportunities for improvement.
Pro Bono Advisor: Offer pro bono consulting services to the firm, leveraging expertise in GRC and information systems auditing to support internal initiatives and enhance operational efficiency. Serve as a trusted advisor to colleagues, providing guidance on complex projects, regulatory compliance issues, and best practices in risk management and information security. Contribute to the firm's thought leadership efforts by sharing insights and knowledge through internal training sessions, workshops, and publications, reinforcing the firm's reputation as a trusted partner in GRC consulting.
Achievements: Successfully advised numerous clients across diverse industries, helping them enhance their GRC practices, strengthen their information security posture, and achieve regulatory compliance. Received commendations from clients and colleagues for delivering high-quality consulting services, demonstrating professionalism, integrity, and expertise in GRC and information systems auditing. Played a key role in the firm's growth and reputation by contributing to business development efforts, client relationship management, and internal knowledge sharing initiatives.
October 2021 - Present
AI Technologies is a Fintech based in Seychelles with its Group head in Dubai UAE. As Lead and Senior Developer I developed products in various countries that are described below in the financial technology space.
Development of Ezipay Zambia Aggregator API: Led the development of the Ezipay Zambia Aggregator API, enabling seamless integration of CGrate API for money remittance, bill payments, and direct debit services via mobile money and bank channels. Successfully implemented functionalities to enhance user experience and streamline financial transactions for clients in Zambia.
Development of Ezipay Cameroon Aggregator API: Spearheaded the development of the Ezipay Cameroon Aggregator API, incorporating Adwapay API to facilitate money remittance, bill payments, and direct debit services via mobile money and bank channels. Ensured seamless integration and interoperability with existing systems to meet the unique needs of clients in Cameroon.
Development of Payment Gateways: Designed and developed payment gateways for Ezipay subsidiaries, including Ezipay Sarl, Ezipay Sierra Leone, and Ezipay Mauritius, catering to diverse payment needs. Integrated Mastercard MPGS API for card payments, enhancing the payment ecosystem for clients of United Bank of Africa and Mauritius Commercial Bank.
Development of Ezipay Global Aggregator API: Conceptualized and implemented the Ezipay Global Aggregator API, facilitating cross-border fund transfers to multiple countries through a unified interface. Implemented robust security measures and compliance protocols to ensure the integrity and confidentiality of financial transactions across international borders.
Development of Ezipay Global USD Wallet: Engineered the Ezipay Global USD Wallet, empowering users to manage USD funds and execute cross-border transactions seamlessly across various channels, including mobile money, card payments, and bank transfers. Implemented user-friendly features and functionalities to enhance accessibility and convenience for global users.
Key Achievements: Successfully delivered scalable and secure APIs and payment gateways, enabling Ezipay to expand its financial services footprint across multiple countries. Played a pivotal role in enhancing financial inclusivity and accessibility by providing innovative solutions for money remittance and bill payments in diverse markets. Ezipay Global API has processed transactions to the tune of 55Million USD as at December 1, 2024.
April 2017 - March 2022
Societe Generale Ghana is a banking institution that is a subsidiary of Societe Generale with its headquarters in Paris, France.
Development of Teller Express: Led the development of Teller Express, a system designed to mobilize funds at customer premises and securely transmit transactions to the Core Banking System (CBS) at the end of each day. Successfully deployed and implemented Teller Express nationwide in Ghana, enabling efficient fund mobilization and transaction processing for the bank's customers.
Development of SG Grow: Spearheaded the development of SG Grow, an E-learning platform utilized by the bank to conduct training sessions for staff members across the country. Designed and implemented features to enhance learning management and streamline training processes for employees at various levels within the organization.
Development of Task Management System: Developed a Task Management System to facilitate job assignment and ticket management for the Information Systems and Technology (IST) Unit. Implemented features for task tracking, prioritization, and assignment, improving workflow efficiency and productivity within the unit.
Integration and Testing: Deployed and conducted integration testing for OpenApp and Digit, ensuring seamless integration with existing systems and adherence to quality standards. Integrated and tested FIPPO, contributing to the enhancement of system functionality and performance.
Development of KYC OCR: Designed and implemented a Python engine for KYC OCR, enabling automated extraction of data from scanned account opening documents. Developed functionality to compare extracted data with CBS records and generate a score based on the comparison, enhancing accuracy and efficiency in KYC processes.
Redevelopment of Visa Card Acquisition System (AUTOCARD): Redeveloped the Visa Card Acquisition System (AUTOCARD), responsible for handling Visa card requests from printing and embossing to final delivery to customers. Enhanced system capabilities and user experience, ensuring seamless card acquisition and management processes.
Security Compliance and Analysis: Implemented API security measures to achieve ISO 27001 certification for the bank, ensuring compliance with international standards and regulations. Served as the Application Security Analyst for PCI-DSS certification, overseeing the implementation of security controls and measures to protect payment card data. Conducted comprehensive code reviews on all in-house applications to assess compliance with ISO and PCI-DSS standards.
Development of RemiSense Solution for KYC Periodic Review: Developed the RemiSense Solution for KYC Periodic Review, enabling efficient and accurate review of customer KYC information. Implemented features to streamline the KYC review process and ensure compliance with regulatory requirements.
October 2014 - June 2016
Teaching Responsibilities: Taught Computer Science and Information Technology Courses including Software Development Life Cycle, Database Systems Design, Computer Security and Forensics, Distributed Systems, and System Analysis Courses. Developed and delivered lectures on software development methodologies, database design, computer security, and distributed computing architectures.
Research Responsibilities: Conducted comprehensive literature reviews on topics related to computer science, information technology, and software engineering. Designed research studies and collected data using qualitative and quantitative methods. Prepared interview questions and protocols for research studies and data collection activities. Maintained accurate records of interviews, research data, and participant information.
Key Achievements: Received positive feedback from students for engaging and effective teaching methods in computer science and information technology courses. Published research findings in peer-reviewed journals and presented research papers at academic conferences. Demonstrated proficiency in research design, data analysis, and scholarly writing, contributing to the advancement of knowledge in computer science and related fields.
January 2016 - June 2016
HODA Holdings is a group corporate office that has business units in Banking, Insurance, Recruitment and Security.
Data Collection and Encryption: Conducted digital forensic investigations to collect files, reports, and other data for analysis and evidence preservation. Utilized encryption techniques to secure collected data, ensuring confidentiality and integrity during storage and transmission.
File Recovery and Investigation: Specialized in the recovery of deleted and corrupted files for forensic analysis and investigation purposes. Employed advanced forensic tools and techniques to reconstruct digital artifacts and uncover evidence relevant to ongoing investigations.
Digital Security Policy Design: Designed comprehensive digital security policies and procedures for the organization, outlining best practices and guidelines for safeguarding digital assets and sensitive information. Ensured alignment with industry standards and regulatory requirements to mitigate cybersecurity risks and enhance resilience against threats.
Information Systems (IS) Audit: Conducted IS audits on companies within the group to assess compliance with digital security policies, regulatory requirements, and industry standards. Identified vulnerabilities, gaps, and weaknesses in systems and controls, providing recommendations for remediation and improvement.
Penetration Testing and Vulnerability Assessments: Collaborated with the security team to perform penetration testing and vulnerability assessments on systems and networks. Utilized ethical hacking techniques to identify and exploit security vulnerabilities, simulating real-world cyberattacks to assess the organization's security posture.
IT Security Training: Developed and delivered IT security training programs for staff members to raise awareness of cybersecurity risks and best practices. Covered topics such as phishing awareness, password security, data protection, and incident response procedures to empower staff in safeguarding against cyber threats.
Data Analysis and Evidence Collection: Conducted data analysis on system files and collected evidence as part of forensic investigations. Leveraged forensic tools and methodologies to analyze digital artifacts and extract valuable information for use in legal proceedings and incident response activities.
October 2013 - August 2014
National Service position.
IT Security Infrastructure Management: Led the management of IT security infrastructure for the infantry regiment, overseeing the implementation and maintenance of security measures to protect sensitive information, systems, and networks. Implemented security policies, procedures, and controls to mitigate cyber threats and ensure compliance with military regulations and standards.
National Service Personnel Supervision: Supervised and mentored National Service persons within the unit, providing guidance, support, and training to ensure their effective integration and contribution to unit operations. Assigned tasks and responsibilities, monitored performance, and provided feedback to support their professional development and growth.
Key Responsibilities: Conducted regular security assessments and audits to identify vulnerabilities and risks. Collaborated with military personnel and external security agencies to coordinate security operations. Provided training and awareness programs on IT security best practices. Maintained up-to-date documentation of IT security policies and procedures. Participated in military exercises and drills to test and validate the unit's IT security capabilities.
June 2011 - December 2013
Software Architecture Development: Led the development of software architecture for various systems and applications within the organization, defining high-level structures and design principles to guide the implementation and evolution of software solutions. Conducted architectural reviews and assessments to ensure alignment with business requirements, scalability, maintainability, and security best practices. Collaborated with cross-functional teams including developers, engineers, and stakeholders to translate business needs into technical solutions and architectural designs.
Infrastructure Performance Improvement: Identified opportunities for performance improvement in systems infrastructure, including servers, networks, databases, and cloud environments. Conducted performance assessments, benchmarks, and analysis to identify bottlenecks, inefficiencies, and areas for optimization. Developed and implemented strategies, configurations, and enhancements to improve system performance, reliability, and scalability.
Key Responsibilities: Conducted thorough analysis of system requirements, user needs, and technical constraints to develop scalable, resilient, and cost-effective software architectures. Designed and documented architectural blueprints, diagrams, and patterns to communicate design decisions and facilitate collaboration among development teams. Evaluated emerging technologies, frameworks, and architectural patterns to inform architectural decisions and drive innovation within the organization.
Key Achievements: Successfully developed and implemented scalable and resilient software architectures for critical systems and applications, enabling business agility and innovation. Improved system performance and reliability by implementing performance optimization strategies and infrastructure enhancements, resulting in enhanced user experience and operational efficiency.
October 2007 - May 2008
Responsibilities: Provided high-quality, timely, and accurate information communication technology (ICT) education to pupils. Developed and delivered engaging lessons and instructional materials that cater to diverse learning styles and abilities. Facilitated hands-on learning experiences and practical exercises to reinforce ICT concepts and skills. Fostered a positive and inclusive learning environment that encourages active participation, collaboration, and critical thinking. Assessed student learning and progress through various evaluation methods, such as quizzes, projects, and presentations.
Key Achievements: Successfully delivered ICT education to pupils, equipping them with essential knowledge and skills for academic success and future career opportunities. Created engaging and interactive learning experiences that fostered student interest and enthusiasm for ICT subjects. Implemented innovative teaching strategies and resources to enhance student learning outcomes and engagement in ICT education.
Total Downloads
Total Citations
Total Views
August 08, 2024
Authors: Sebastian Anetey Shamo
Deepfake technology, powered by advanced artificial intelligence techniques such as generative adversarial networks (GANs), has emerged as a disruptive force with profound implications for financial markets. By enabling the creation of hyper-realistic but fraudulent multimedia content, deepfakes pose a significant threat to the integrity of trading signals, market sentiment, and investor decision-making. This paper explores the multifaceted impact of deepfakes on trading signals, focusing on their ability to manipulate market sentiment, disrupt algorithmic trading systems, and exploit the vulnerabilities of retail investors.
DOI: 10.2139/ssrn.5070125
173
Downloads
1
Citations
894
Views
October 14, 2024
Authors: Sebastian Anetey Shamo
Quantum computing, with its revolutionary computational capabilities, is poised to transform the financial technology (FinTech) sector. By solving complex problems that are beyond the scope of classical computers, quantum computing offers unprecedented opportunities for portfolio optimization, risk management, fraud detection, and secure encryption. Simultaneously, Generation Z (Gen Z), as digital natives, has emerged as a key demographic driving technological adoption, demanding innovative, personalized, and sustainable solutions. This study explores the intersection of quantum computing and FinTech, emphasizing how Gen Z's preferences influence the adoption and integration of this technology.
DOI: 10.2139/ssrn.5070193
87
Downloads
0
Citations
366
Views
June 06, 2024
Authors: Sebastian Anetey Shamo
The advent of quantum computing poses a significant threat to contemporary cryptographic systems, necessitating the development and standardization of post-quantum cryptographic (PQC) algorithms. This paper explores the current state of the NIST Post-Quantum Cryptography project and contrasts it with ISO's cryptographic standardization efforts. NIST, through a rigorous and iterative evaluation process, has selected a set of candidate algorithms, including lattice-based, code-based, multivariate polynomial, and hash-based cryptographic techniques, with an emphasis on security, performance, and implementation feasibility.
DOI: 10.2139/ssrn.4864519
78
Downloads
1
Citations
1,214
Views
December 10, 2024
Authors: Sebastian Anetey Shamo
This study introduces a dynamic portfolio optimization framework that integrates individual financial health metrics, such as credit scores and debt-to-income (DTI) ratios, into the investment decision-making process. Unlike traditional portfolio optimization methods that focus solely on risk-return trade-offs, this model incorporates personalized constraints to align portfolio allocations with an investor's financial capacity and liquidity needs. The framework minimizes portfolio risk while achieving user-defined target returns through convex optimization, ensuring disciplined convex programming compliance.
DOI: 10.2139/ssrn.5071205
62
Downloads
0
Citations
259
Views
November 2014
Authors: Sebastian Shamo, Dominic Damoah, J. B. Hayfron-Acquah, Edward D Ansong, Lewis Maxwell Selby Jnr.
Programming with locks is very difficult in multi-threaded programmes. Concurrency control of access to shared data limits scalable locking strategies otherwise provided for in software transaction memory. This work addresses the subject of creating dependable software in the face of eminent failures. In the past, programmers who used lock-based synchronization to implement concurrent access to shared data had to grapple with problems with conventional locking techniques such as deadlocks, convoying, and priority inversion. This paper proposes another advanced feature for Dynamic Software Transactional Memory intended to extend the concepts of transaction processing to provide a nesting mechanism and efficient lock-free synchronization, recoverability and restorability.
406
Downloads
0
Citations
1,201
Views
November 2014
Authors: Sebastian Shamo, Lewis Maxwell Selby Jnr., Dominic Damoah, Edward D Ansong, J. B. Hayfron-Acquah
This paper proposes a formal framework specification that applies an advanced recovery mechanism, functional in a client-server architecture while addressing atomicity and consistency issues. Another palpable issue in using such dominant architectures is recovery. This paper also addresses this issue in context with the client-server architecture using extensions of the original ARIES algorithm and concepts of Software Transaction Memory. This novelty has been successfully implemented and tested for propriety and applicability.
1,876
Downloads
0
Citations
1,431
Views
February 20, 2014
Authors: Sebastian Shamo, Dominic Damoah, Edward D Ansong, Benjamin Hayfrom-Acquah, Brighter Agyemang, Roy Villafane
This work explores a better way to perform transactions on a federated database system in a failure prone environment. The main emphasis was laid on enhancing the architecture of federated systems by adding a sync coordinator that will sync the partitioned global and local databases upon commit.
504
Downloads
2
Citations
504
Views
Kwame Nkrumah University of Science and Technology
2015 - 2019
Valley View University
2009 - 2013
October 2013 - Present
Community Service Projects: Participated in various community service projects organized by Lions Club International to address local needs and promote social welfare. Contributed time, effort, and resources to initiatives such as food drives, clothing donations, and disaster relief efforts to support individuals and families in need.
Health and Wellness Programs: Volunteered for health and wellness programs organized by Lions Club International to promote public health awareness and disease prevention. Assisted in organizing health screenings, vaccination drives, and health education workshops to empower communities to lead healthier lives.
Environmental Conservation Efforts: Supported environmental conservation efforts led by Lions Club International to protect natural habitats, preserve biodiversity, and promote sustainable practices. Participated in tree planting campaigns, beach clean-ups, and recycling initiatives to enhance environmental stewardship and raise awareness about conservation issues.
Youth Development Initiatives: Engaged in youth development initiatives organized by Lions Club International to empower young people and foster leadership skills and community involvement. Mentored and supported youth-led projects, such as youth camps, leadership training workshops, and community service activities, to nurture the next generation of leaders.
Fundraising Events: Participated in fundraising events organized by Lions Club International to generate financial support for humanitarian causes and charitable projects. Volunteered in organizing and promoting fundraising events such as charity galas, auctions, and charity runs to mobilize resources for community service activities.
International Service Projects: Contributed to international service projects organized by Lions Club International to address global challenges and support communities in need around the world. Participated in humanitarian missions, medical outreach programs, and disaster relief efforts to provide aid and assistance to underserved populations in different countries.
July 2011 - Present
Coordinating programs and workshops focused on holistic well-being and personal development.
Member, Information Systems Audit & Control Association
ISACA, New England Chapter