Keep in touch with meI'm using Intch to connect with new people. Use this link to open chat with me via Intch app
Network Power<100 people
Roles
🔥100%
Startup Founder
🧑‍🔬100%
Engineer
🧨100%
Consulting
Geos
🇬🇧100%
United Kingdom
Work Background
Cloud Security & Data Architect
Zurich InsuranceCloud Security & Data Architect
Jan. 2022 - Apr. 2025Bratislava, SlovakiaAs Cloud Security & Data Architect at Zurich Insurance, I designed and secured cloud and data platforms within highly regulated environments. My work focused on creating resilient, compliant AWS and Azure architectures aligned with Zurich’s internal controls and mapped to NIST SP 800, NIST CSF, ISO 27002, CIS Controls, and COBIT 19. I conducted control assessments and supported audits by producing compliance evidence packages. I engineered secure data architectures for financial data using Databricks, SageMaker, EC2, RDS, and Delta Lake. Controls included encryption (at rest/in transit), masking, and fine-grained access policies to ensure data confidentiality, integrity, and availability. I also led IAM strategy across AWS and Azure multi-account/subscription setups. Enforced least privilege, separation of duties, and cloud-native access models incorporating PAM best practices for secure, auditable access. To support critical systems, I implemented disaster recovery strategies with tested runbooks, aligned with defined RTOs/RPOs. This ensured resilience and continuity across key business functions. Security assurance was embedded into the SDLC. I conducted architecture reviews and led threat modeling for apps migrating to or built in cloud, catching risks early and reducing vulnerabilities. Security controls extended into pipelines and apps. I embedded controls into ETL workflows (AWS Glue, Azure Data Factory) and serverless (Lambda, Azure Functions) using secure coding, hardened configs, and encryption. Cost efficiency remained a priority. I led optimization efforts to rightsize resources, apply reservations, and reduce waste without compromising security or compliance. Collaboration was essential—I worked closely with Security Ops, Risk, and Audit teams to address findings, provide remediation strategies, and continuously improve the security posture.
Cloud Solution Architect & Cloud Engineer
DXC TechnologyCloud Solution Architect & Cloud Engineer
Dec. 2016 - Dec. 2020BratislavaTransitioning from a hands-on Cloud Engineer to a Cloud Solution Architect at DXC Technology, I focused on designing secure, scalable AWS and Azure solutions for diverse enterprise clients. A major responsibility was architecting and managing secure virtualization platforms—VMware Private Cloud (vSphere/vCenter) and Red Hat Virtualization with OpenStack. This involved implementing OS hardening (CIS benchmarks), network segmentation using virtual switches/NSX concepts, and enforcing least privilege through RBAC. I led secure cloud migrations and application modernizations, including sensitive SAP workloads. These solutions aligned with AWS Well-Architected Framework principles, balancing security, cost, and performance. I used Infrastructure as Code (IaC) tools—Terraform, Ansible, YAML, and JSON—to automate compliant cloud provisioning and configuration management. This minimized manual errors, ensured consistency, and strengthened security through codified best practices. I actively contributed to presales and solutioning, creating detailed technical proposals and RFP/RFC responses that emphasized security, compliance (PCI DSS, GDPR where applicable), and business value. These documents demonstrated how proposed architectures met client needs while embedding strong security foundations. Internally, I developed reusable security patterns and architectural blueprints to standardize cloud deployments, accelerating secure delivery across teams. I collaborated closely with stakeholders to align solutions with evolving security policies and compliance requirements. Additionally, I mentored junior engineers on cloud security concepts, automation, and emerging technologies, fostering a culture of secure-by-design thinking and continuous improvement.
Senior System Engineer
AT&T Global Network Services Senior System Engineer
Jan. 2012 - Dec. 2015Bratislava, SlovakiaAs a Senior System Engineer at AT&T Global Network Services, I provided Tier 3 support and security oversight for large-scale, mission-critical Windows and Linux environments. My responsibilities emphasized proactive security, including OS hardening using industry benchmarks, managing complex patch cycles to address vulnerabilities, and maintaining secure configurations across hundreds of systems. I was a key player in incident response, performing log analysis, supporting forensics, and coordinating remediation under high-pressure scenarios across distributed teams. I also managed and secured VMware Private Cloud infrastructure (vSphere/vCenter), applying security best practices for hypervisors, virtual machines, and network segmentation within virtualized environments. I enforced strict access controls and conducted regular audits to ensure compliance. I helped shape security strategies tailored to enterprise needs—contributing to vulnerability management planning, advising on intrusion detection/prevention concepts, and architecting resilient DR solutions to maintain business continuity and safeguard data integrity. A core aspect of my role involved conducting technical risk assessments for system changes and new deployments, ensuring that security implications were fully evaluated and mitigated before implementation. I played a key role in identifying system design weaknesses and recommending secure alternatives aligned with evolving organizational security policies. Beyond engineering, I mentored junior team members on secure system administration practices, emphasizing operational security standards and procedural discipline. Cross-functional collaboration was essential—I worked with network engineers, app support, and SecOps to resolve complex issues spanning infrastructure layers, ensuring secure, stable global services. My role was instrumental in upholding security posture and supporting operational excellence across a critical enterprise IT ecosystem.
Senior Technical Support Specialist
Dell TechnologiesSenior Technical Support Specialist
Jan. 2011 - Jan. 2012Bratislava, SlovakiaAs a Senior Technical Support Specialist at Dell, I delivered Tier 3 technical support for enterprise-level clients utilizing Dell hardware and software solutions. My role involved troubleshooting complex technical issues, including hardware failures, software compatibility problems, and security-related configuration challenges. I focused on optimizing Dell systems for peak performance and reliability, contributing to increased customer satisfaction through effective problem resolution.
IT Consultant
Zivnost(Tax Number)IT Consultant
Jan. 2010 - Jan. 2011Piešťany, Trnava Region, SlovakiaOperating as an independent IT Consultant (Zivnost), I provided expert technical consulting services targeted at small and medium-sized businesses in the Piešťany region. My advisory services focused on optimizing network infrastructure performance and reliability, conducting system security hardening audits and providing actionable recommendations, planning secure cloud migration strategies, and implementing IT infrastructure management best practices to enhance overall security and efficiency.
Senior Unix System Administrator(Tier 3)
Soitron s.r.oSenior Unix System Administrator(Tier 3)
Jan. 2008 - Jan. 2009Bratislava, SlovakiaServing major enterprise clients like HP, Airbus, Tetra Pak, and Kone under an HPE contract at Soitron, I delivered high-level Tier 3 Unix/Linux system administration, ensuring the operational integrity and security of their critical infrastructure. My responsibilities covered a diverse range of mission-critical operating systems, including HP-UX, AIX, Red Hat Enterprise Linux (RHEL), SUSE Linux Enterprise Server (SLES), and Oracle Solaris. A primary focus was the consistent implementation and verification of security best practices across these varied platforms. This involved managing rigorous patching schedules, applying system hardening techniques based on client requirements and industry standards (e.g., STIGs, CIS), meticulously controlling user access management using native OS tools and centralized systems where available, and configuring system log monitoring to detect potential security anomalies or policy violations. I balanced the need for system performance optimization with the imperative to maintain a strong security posture, diagnosing complex issues, resolving critical incidents (including security-related ones), and implementing security measures to protect sensitive corporate data.
Senior Technical Support Specialist
CorinexSenior Technical Support Specialist
Feb. 2007 - Feb. 2008Bratislava, SlovakiaIn my role as Senior Technical Support Specialist at Corinex, I provided advanced Tier 3 technical support for the company's specialized communication technologies. My expertise focused on resolving complex issues related to powerline communication (PLC) and broadband over powerline (BPL) deployments for service provider and utility clients.
Senior Technical Support Specialist
onsemiSenior Technical Support Specialist
Jan. 2006 - Jan. 2007Piešťany, Trnava Region, SlovakiaAs a Senior Technical Support Specialist at onsemi (formerly AMI Semiconductor), I provided comprehensive Tier 3 technical support across a range of internal IT systems. This included troubleshooting hardware, software, and network connectivity issues for employees, contributing to the smooth operation of client systems and enhancing overall productivity within the organization.
Production Engineer -Linux
Lycos IncProduction Engineer -Linux
Jan. 2001 - Dec. 2002Waltham, Massachusetts, United StatesWorking as a Production Engineer at Lycos Inc. during the dot-com era, I supported the critical Linux-based production infrastructure powering the popular Tripod and Angelfire web hosting properties. My responsibilities focused on ensuring high availability, optimal performance, and robust system security for these large-scale online platforms through proactive monitoring, regular maintenance, and security patching.
Distributed Hosting Quality Assurance Engineer
Genuity, Inc.Distributed Hosting Quality Assurance Engineer
Jan. 2001 - Dec. 2001Burlington, Massachusetts, United StatesAs a Distributed Hardware QA Engineer at Genuity Inc., my responsibilities included rigorous testing of core network infrastructure equipment prior to deployment in large-scale data center environments. This involved conducting hardware compliance testing against specifications, performance benchmarking, and crucially, security vulnerability assessments for devices like the F5 Big-IP, which functioned as both high-availability load balancers and network firewalls, as well as Cisco Catalyst and Arrowpoint layer 2/3 switches. Security testing involved verifying secure configuration options, assessing resistance to common network-level attacks, and ensuring adherence to security best practices for network device management. To monitor the extensive lab and production infrastructure, I utilized the Tivoli enterprise monitoring suite, configuring checks and analyzing alerts, including the identification and preliminary analysis of security-related events or anomalous system behavior indicated by monitoring data.
Senior Unix System Administrator
Blackstone Technology GroupSenior Unix System Administrator
Jan. 2000 - Jan. 2001Worcester, Massachusetts, United StatesAs Senior Unix System Administrator at Blackstone Technology Group, I specialized in managing and optimizing high-performance computing (HPC) cluster environments critical for research and development workloads, primarily utilizing Sun Grid Engine (SGE) for efficient job scheduling and resource allocation. My duties included the installation, configuration, and ongoing maintenance of Unix-based servers (Solaris, Linux). I focused on tuning SGE cluster configurations for optimal performance, balancing workloads, and ensuring efficient resource distribution. Key tasks involved managing SGE user accounts, job queues, and implementing access controls. I developed automation scripts (Bash, Perl, Python) for routine administration, monitored cluster health and job execution using tools like Nagios/Prometheus concepts and SGE utilities, applied essential OS patches and security updates, managed associated HPC storage solutions (NFS/SAN), and maintained backup/disaster recovery plans for these vital computing environments. Collaboration with researchers, developers, and IT teams was essential, alongside maintaining thorough system documentation.
Presales Engineer
RSA SecurityPresales Engineer
Jan. 2000 - Jan. 2001Bedford, Massachusetts, United StatesIn my role as a Presales Engineer at RSA Security, I provided specialized technical expertise focused on the RSA BSAFE portfolio of cryptographic and security software development toolkits (SDKs). My primary function was to support the sales process by demonstrating deep technical understanding of encryption, digital signatures, public key infrastructure (PKI), and secure authentication protocols to prospective enterprise clients and software development teams. I engaged directly with clients to analyze their specific security requirements, translating business needs into technical specifications that could be addressed by RSA solutions. This involved delivering tailored technical presentations and product demonstrations, architecting security solutions that integrated BSAFE components effectively, and advising developers and architects on the secure implementation and integration strategies for incorporating robust cryptographic functionalities into their applications and products. This role required a strong grasp of security concepts and the ability to communicate complex technical details clearly.
Year 2k Consultant
TEKsystemsYear 2k Consultant
Jan. 1999 - Jan. 2000Framingham, Massachusetts, United StatesAs a Y2K Testing Consultant contracted through TEKsystems, I performed critical Year 2000 (Y2K) compliance testing for client systems. Utilizing Tally Systems software, my role involved executing test scripts, identifying potential date-related issues in hardware and software, documenting findings, and contributing to risk mitigation efforts to ensure business readiness for the transition to the year 2000.

Requests

Touchpoint image
0
Looking to expand my network
Intch is a Professional Networking App for the Future of Work
300k+ people
130+ countries
AI matching
See more people like Sashree on Intch
IT
451129 people
16
Senior software engineer
19
Project manager @ Zois Energy limited
20
Project and business Manager
ITTech Support
91947 people
18
Financial Consultant @ Standard capital corporation
121
Investor Relations Manager @ ExxonMobil
33
Chief Financial Officer and Senior Vice President @ ExxonMobil