Ashok Kumar Mohanty, Developer in Delhi, India
Ashok is available for hire
Hire Ashok

Ashok Kumar Mohanty

Verified Expert  in Engineering

Cloud Security Architect and Developer

Location
Delhi, India
Toptal Member Since
October 18, 2021

Ashok is a cloud and application security architect with 8+ years of experience, complemented by 16 years as an IT professional. He has deep expertise in Cloud SaaS security, data center application migration to the cloud, threat modeling, data classification, cloud security automation, identity and access management, and application security.

Availability

Part-time

Preferred Environment

IT Security, Veracode, QualysGuard, Cloud Security, Application Security, Data Center Migration, Automation

The most amazing...

...thing I've developed and implemented was a cloud security baseline for 35 cloud accounts in three months, for which I was recognized by my employer.

Work Experience

Cloud Security Architect

2013 - PRESENT
PerkinElmer
  • Implemented cloud security baselines for 35 cloud accounts to ensure that they were compliant.
  • Provided technical direction to teams on architecting, designing, and building secure systems for cloud and hybrid cloud environments.
  • Led the development of cloud security strategies, standards, architecture, and designs to be consumed by engineering teams across clients and several cloud platforms.
  • Designed and implemented cloud-native architectures and designs to meet requirements with minimal risk to the organization and appropriate security controls in place.
  • Provided technical oversight for information security while engaging with other senior technical leaders in the design and implementation of cloud and hybrid cloud-based implementations and solutions.
  • Collaborated with engineering, infrastructure services, and application development organizations to choose appropriate technology solutions and facilitate complete integration with third-party environments.
  • Developed a cloud security roadmap in alignment with cloud functional and technical roadmaps.
  • Performed threat management and threat modeling, identified threat vectors, and developed use cases for security monitoring.
Technologies: Cloud Security, Threat Modeling, Application Security, Data Classification, Data Center Migration, Python, Amazon Web Services (AWS), Veracode, QualysGuard, SOC 2, SaaS, Server Hardening, Automation, IT Security

Team Lead

2006 - 2013
Q3 Technologies
  • Played a pivotal role in the BITX machine-to-machine (M2M) application development project, which is a modern version of SCADA. This included an M2M application, middleware, network infrastructure, gateway, and remote devices and protocols.
  • Participated in developing a core M2M gateway that acted as middleware between a client and an end machine.
  • Assisted in developing a lightweight protocol that allowed client software to communicate with vending machines.
Technologies: SaaS

Software Developer

2005 - 2006
World Fashion Exchange
  • Assisted in developing a new breed of ERP software that maintains the functionality of inward-looking core ERP systems and, at the same time, allows for features that can connect an entire value chain.
  • Focused on the quality control module as a member of the ERP development team.
  • Implemented the quality control database and reporting components using SQL reporting services.
Technologies: ASP.NET, C#, SQL Server Reporting Services (SSRS), Microsoft SQL Server

Software Engineer

2004 - 2005
Electrobug Technologies Ltd
  • Created a rule-based email alert system for the Eazy Revenue Mgmt System (EZRMS) online interface. Electrobug provided real-time competitive and channel rate information to help users manage and maximize revenues across all distribution channels.
  • Developed a retail web tool for price matching that enabled clients' pricing managers to view the latest data for their competitors' product ranges, on-demand, in an interesting and interactive interface.
  • Assisted in the development and management of database stored procedures.
Technologies: ASP.NET, C#, Microsoft SQL Server

Centralized Access and Identity Management System

A central control plane for AWS IAM that provides an easier way to manage permissions and access across multiple accounts while encouraging least-privilege permissions. An IAM self-service wizard lets users request IAM permissions in plain English. Cross-account resource policies can be automatically generated and applied with a single click for certain resource types.
2000 - 2003

Master's Degree in Computer Science

Biju Patnaik University of Technology - Odisha, India

AUGUST 2021 - PRESENT

Certified Cloud Security Professional (CCSP)

Cybrayy

Tools

AWS IAM

Platforms

QualysGuard, Amazon Web Services (AWS)

Paradigms

Automation, DevSecOps

Languages

Python, SAML

Other

Threat Modeling, Application Security, Data Classification, Data Center Migration, Veracode, Identity & Access Management (IAM), Vulnerability Management, Server Hardening, Incident Management, SOC 2, Incident Response, Cloud Security, GDPR, SaaS, IT Security, Machine-to-Machine (M2M)

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring