Ashok Kumar Mohanty
Verified Expert in Engineering
Cloud Security Architect and Developer
Delhi, India
Toptal member since October 18, 2021
Ashok is a cloud and application security architect with 8+ years of experience, complemented by 16 years as an IT professional. He has deep expertise in Cloud SaaS security, data center application migration to the cloud, threat modeling, data classification, cloud security automation, identity and access management, and application security.
Portfolio
Experience
Availability
Preferred Environment
IT Security, Veracode, QualysGuard, Cloud Security, Application Security, Data Center Migration, Automation
The most amazing...
...thing I've developed and implemented was a cloud security baseline for 35 cloud accounts in three months, for which I was recognized by my employer.
Work Experience
Cloud Security Architect
PerkinElmer
- Implemented cloud security baselines for 35 cloud accounts to ensure that they were compliant.
- Provided technical direction to teams on architecting, designing, and building secure systems for cloud and hybrid cloud environments.
- Led the development of cloud security strategies, standards, architecture, and designs to be consumed by engineering teams across clients and several cloud platforms.
- Designed and implemented cloud-native architectures and designs to meet requirements with minimal risk to the organization and appropriate security controls in place.
- Provided technical oversight for information security while engaging with other senior technical leaders in the design and implementation of cloud and hybrid cloud-based implementations and solutions.
- Collaborated with engineering, infrastructure services, and application development organizations to choose appropriate technology solutions and facilitate complete integration with third-party environments.
- Developed a cloud security roadmap in alignment with cloud functional and technical roadmaps.
- Performed threat management and threat modeling, identified threat vectors, and developed use cases for security monitoring.
Team Lead
Q3 Technologies
- Played a pivotal role in the BITX machine-to-machine (M2M) application development project, which is a modern version of SCADA. This included an M2M application, middleware, network infrastructure, gateway, and remote devices and protocols.
- Participated in developing a core M2M gateway that acted as middleware between a client and an end machine.
- Assisted in developing a lightweight protocol that allowed client software to communicate with vending machines.
Software Developer
World Fashion Exchange
- Assisted in developing a new breed of ERP software that maintains the functionality of inward-looking core ERP systems and, at the same time, allows for features that can connect an entire value chain.
- Focused on the quality control module as a member of the ERP development team.
- Implemented the quality control database and reporting components using SQL reporting services.
Software Engineer
Electrobug Technologies Ltd
- Created a rule-based email alert system for the Eazy Revenue Mgmt System (EZRMS) online interface. Electrobug provided real-time competitive and channel rate information to help users manage and maximize revenues across all distribution channels.
- Developed a retail web tool for price matching that enabled clients' pricing managers to view the latest data for their competitors' product ranges, on-demand, in an interesting and interactive interface.
- Assisted in the development and management of database stored procedures.
Experience
Centralized Access and Identity Management System
Education
Master's Degree in Computer Science
Biju Patnaik University of Technology - Odisha, India
Certifications
Certified Cloud Security Professional (CCSP)
Cybrayy
Skills
Tools
AWS IAM
Paradigms
Automation, DevSecOps
Platforms
QualysGuard, Amazon Web Services (AWS)
Languages
Python, SAML
Other
Threat Modeling, Application Security, Data Classification, Data Center Migration, Veracode, Identity & Access Management (IAM), Vulnerability Management, Server Hardening, Incident Management, SOC 2, Incident Response, Cloud Security, GDPR, SaaS, IT Security, Machine-to-Machine (M2M)
How to Work with Toptal
Toptal matches you directly with global industry experts from our network in hours—not weeks or months.
Share your needs
Choose your talent
Start your risk-free talent trial
Top talent is in high demand.
Start hiring