Shashi Pendyala
About Shashi Pendyala
Shashi Pendyala is a Security Architect specializing in cloud security and identity and access management, with a strong background in securing applications throughout the software lifecycle.
Current Role as Security Architect
Shashi Pendyala currently serves as a Security Architect at a confidential organization in India. In this role, he specializes in cloud security and identity and access management. He is responsible for designing and implementing security measures that protect sensitive data and applications. His work involves securing applications throughout the software lifecycle, ensuring that security is integrated at every stage of development.
Previous Experience at Secure-24
Before his current position, Shashi Pendyala worked at Secure-24 as a Network Security Engineer from 2019 to 2021 in Hyderabad, Telangana, India. During his tenure, he focused on network security operations and threat modeling. His role involved identifying vulnerabilities and implementing strategies to mitigate risks, contributing to the overall security posture of the organization.
Experience at Tech Mahindra
Shashi Pendyala also has significant experience from his time at Tech Mahindra, where he worked as a Senior Security Analyst (Service Delivery Engineer) from 2014 to 2019 in the Hyderabad Area, India. In this position, he was involved in various security initiatives and contributed to the development of security protocols and practices within the organization.
Educational Background in Engineering
Shashi Pendyala studied at Careers for Youth in Telangana, where he focused on Electrical and Electronics Engineering (EEE). He achieved a Bachelor of Technology (BTech) degree, which provided him with a solid foundation in engineering principles and technical skills relevant to his career in security architecture.
Expertise in Cloud Security and Threat Modeling
Shashi Pendyala possesses expertise in cloud security and identity and access management. His knowledge extends to securing applications throughout the software lifecycle, which includes threat modeling and network security operations. This expertise enables him to address complex security challenges and implement effective solutions in his current role.