Sergey Solovey

The Future is Written in Code

Technology shapes our world, and every line of code is a step toward the future. Whether it's artificial intelligence, web development, or automation, innovation begins with a single keystroke.

We don’t just predict the future - we create it. And at the heart of this transformation lies code: powerful, efficient, and limitless in potential.

Hello and welcome! Technology is an endless journey - let’s navigate it together.


My name is Sergey Solovey. I was born in Ukraine and have been in the IT field since 1999, when I began my studies at the National Technical University. However, my passion for technology started much earlier. With a master's degree in Information Systems, I have built my career around optimizing and automating processes.

Since 2015, I have been living in Israel, where I currently work as an Information Systems Engineer at the Technion - Israel Institute of Technology (Jan 2019 - Present). My role goes beyond software development - I manage the entire lifecycle of IT systems, from designing and deploying infrastructure to writing code, automating workflows, and ensuring security. I build solutions from the ground up, integrating complex systems while maintaining high availability and performance.

I specialize in IT infrastructure management, automation, and security, seamlessly integrating development with system administration. My expertise spans from provisioning and configuring servers to designing resilient architectures and streamlining operations. I take a hands-on approach to both backend and frontend development, ensuring robust, scalable, and secure environments. By combining Full Stack development with DevOps practices, I build and automate systems from the ground up - enhancing efficiency, security, and long-term sustainability.

I follow a process-oriented approach, ensuring that every task and system operates within a structured and efficient workflow. This methodology is based on internationally recognized quality management standards and driven by the principle of continuous improvement.

At its core lies the Deming Cycle (PDCA - Plan, Do, Check, Act), a proven model for process optimization:

  • Plan – Define objectives, analyze requirements, and design effective solutions.
  • Do – Implement and test solutions in a controlled environment.
  • Check – Evaluate performance using measurable indicators, audits, and feedback.
  • Act – Apply necessary improvements and standardize best practices.

By continuously iterating through this cycle, I ensure that systems remain resilient, scalable, and aligned with industry best practices. This structured approach not only enhances efficiency but also strengthens long-term reliability and adaptability.

To uphold best practices in IT operations, I adhere to internationally recognized ISO standards, such as:

  • ISO 9001 – Quality Management.
  • ISO 20000-1 – IT Service Management.
  • ISO 27001 – Information Security Management.

These standards provide a structured framework for:

  • Process optimization – eliminating inefficiencies and enhancing service delivery.
  • Risk management – strengthening security, ensuring compliance, and increasing resilience.
  • Service reliability – improving performance, reducing downtime, and enhancing user satisfaction.

Beyond structured process management, I incorporate Quality Assurance (QA) throughout the entire development lifecycle. Leveraging ISTQB-aligned methodologies, I apply rigorous testing practices to ensure software reliability, security, and usability. However, QA is more than just testing—it’s about proactively preventing potential issues before they arise.

By integrating QA, automation, security, and continuous improvement, I develop high-performance, future-proof systems that evolve to meet new challenges while maintaining efficiency, security, and reliability.

Alongside structured quality management, I embrace Agile methodologies to ensure flexibility and adaptability in development and IT operations. Agile principles emphasize:

  • Collaboration – Fostering teamwork and transparent communication.
  • Iterative progress – Rapidly delivering incremental improvements.
  • Responsiveness to change – Adapting quickly to evolving business needs.

By combining Agile, QA, automation, and security, I develop scalable, high-performance systems that remain efficient, secure, and future-proof in a rapidly changing technological landscape.

In the world of ones and zeros, the path is yours to define. Follow the white rabbit, and let your code be the guide through the limitless possibilities of the digital universe.

In Progress: Secure Web Projects Infrastructure with Layered Proxy Architecture in AWS, DMZ, and Internal Network

I am currently developing and maintaining a secure, segmented infrastructure for web projects hosted across AWS, a DMZ, and the faculty’s internal network.

Active web servers in AWS undergo regular reconfiguration and security audits to ensure adherence to best practices. As part of the architecture evolution, several web applications have been migrated to the DMZ to enhance security through network segmentation and controlled access.

Dedicated reverse proxy servers are deployed in AWS, the DMZ, and the internal network, with all traffic routed through these secure and monitored gateways. This multi-layered proxy architecture ensures strict traffic inspection, isolation, and access control between external users and backend services.

Key project components include:

  • Hosting and managing web projects in AWS with continuous configuration updates and security hardening
  • Deployment and administration of proxy servers in AWS, DMZ, and internal networks to regulate traffic flow
  • Secure and optimized network setup: routing, proxy integration, firewall rules
  • Implementation of modern web security standards: TLS, HSTS, CSP, and strict HTTP headers
  • Network segmentation for high isolation, fault tolerance, and maintainability

The project is carried out iteratively with ongoing testing and optimization, aiming to build a robust, scalable, and secure platform for mission-critical web services.

AOS v2.7–2.8: Automated Account Reactivation and Template-Based Messaging

Developed and implemented key automation features within the CS Faculty’s Account Operation System (AOS) to simplify account management and enhance communication with users.

  • v2.7: Automated reactivation of disabled accounts upon login via the Technion STAFF domain, including smart OU mapping and error handling with notifications and audit logging.
  • v2.8: Developed a dynamic, database-driven message templating system for password reset and account notifications, supporting multiple account types and automated triggers.

Impact: Reduced manual administrative tasks, improved security compliance, and enhanced communication consistency and traceability.

Signature Generator v3.0: Centralized Email Signature Automation for CS Faculty

The Signature Generator is a centralized system designed to automate and standardize email signature creation across the CS Faculty. It ensures consistent branding, reduces manual effort, and supports multilingual output in both English and Hebrew.

Key Features

  • Active Directory Authentication: Secure login with CSF credentials and role-based access
  • Live Preview: Real-time display of signatures, including font sizes, paddings, and language direction
  • Automatic Generation: Users can instantly generate signatures from synced data (e.g., name, role, phone)
  • Dual Database Support: Compatible with both MS SQL Server and MySQL
  • Website Integration: Pulls and syncs user data from the faculty website (AWS-hosted)
  • Admin Tools: Signature preview and export (PNG, JPG, HTML, BAT); Super admin controls for editing, customization, and reset; Customizable formatting options and prefix definitions.

Purpose and Impact

The system streamlines email signature management, enforces consistent visual identity, simplifies deployment across platforms (including Outlook), and ensures compliance with institutional branding for both internal and external communication.

CS GPU Cluster v3.3: Automated Access Management for High-Performance Computing

This web-based system streamlines access requests to CS GPU clusters (e.g., Newton and Lambda) by automating authentication, user filtering, and submission logic based on faculty affiliation and user role.

Key Features

  • Technion Account Authentication: Secure login with domain and faculty-specific account validation
  • Dynamic Request Logic: Intelligent filtering based on OU structure (e.g., GRAD, STAFF, UNDERGRAD) across multiple Technion faculties
  • Manual and Self-Service Modes: Supports both admin-initiated and user-initiated requests
  • Frontend Improvements (v3.3): Refactored input validation and UI/UX fixes based on user feedback (e.g., password character validation bug fix)
  • Multi-Faculty Support: Configurable access rules for 18 Technion faculties and the Computing and Information Services (CIS) division, with precise mentor/student separation per cluster and request type

Purpose and Impact

This system significantly reduces administrative overhead and ensures accurate access control to high-demand GPU resources, serving both CS faculty and external departments.


Dynamic Faculty Website

Completed the development of new pages, including sections like Technical Reports and Theses and a unique search mechanism integrated with Google Scholar. The primary graphics were migrated from the previous static version.

Developed an administrative area with a web interface and role-based access control. Each role manages only the records and functionalities it is authorized for. For example, access can be restricted to managing employees, events, news, or courses.

Faculty Websites on WordPress

  • Developed undergraduate.cs.technion.ac.il following the design of the main faculty website.
  • Enhanced graduate.cs.technion.ac.il.
  • Created a single-page site, update.cs.technion.ac.il, for centralized message management.

Migration to PHP 8+

Migrated multi-site WordPress instances to PHP 8+ on the AWS CSWP server (over 100 sites). This included working on PHP code and cleaning up the database from unused sites, reducing its size by half.

AOS System Updates

Added features:
Password change for domain accounts via the web interface. Automatic detection of accounts with passwords older than a year, as well as disabled and alumni accounts (with color-coded marking). Password change reminders. Automatic account renewal for active accounts for one year. Creation of accounts on the new LDAP server. Direct interaction with Active Directory for managing domain accounts (adding, updating, and changing passwords) without relying on server-side scripts on the AD Server. Previously, the system transmitted data to the AD Server, which launched scripts after extensive analysis.

Guest WiFi and Printers

  • Developed a system to manage guest WiFi access and ensure timely deactivation.
  • Created a similar subsystem for printer management.

Printer Monitoring

Implemented a Windows service that collects data on printer statuses in the internal network and transmits it via API to the AWS cloud (link) for centralized analysis and monitoring.

APIs for Gradweb

Developed:

  • 4 APIs for retrieving data in JSON format.
  • 2 APIs for user authentication via Active Directory.

SMonitor System

Successful development and implementation of the storage monitoring system:

  • Effective control of data storage utilization.
  • Timely identification of outdated or erroneous records.
  • Optimization of resource usage and prevention of overloads.

Cluster Management Automation

Developed an automated system for managing nodes on Newton, Lambda, and Gipdeep clusters. The data is integrated into the existing GPU Cluster system and transmitted via API to AWS.

Links to status pages:

Account Logger

Implemented a system to monitor domain account logins.

SSL Certificate Monitoring

Developed a tool for automatic monitoring of SSL certificate validity.

Server Maintenance and Security

  • Regular updates and configuration of web servers (both local and AWS-based).
  • Configuration of appropriate DNS records.
  • Vulnerability scanning, SSL certificate replacement, and security configuration.
  • Deployment and creation of new web servers for faculty projects.

Support for Existing Systems and Support for Faculty Websites Hosted on AWS Servers

  • Ongoing updates, bug fixes, and the addition of new functionality to previously developed systems (over 20 systems).
  • Maintaining over 170 websites hosted on AWS servers and within the internal network, such as the faculty Wiki system
I'm always open to new ideas and connections. Feel free to reach out!

You can contact me at:

Last Projects

From Ideas to Execution