Skip to content

Cybersecurity Engineer | Gyorgy Bolyki

A decade of practical security engineering work behind the Microsoft 365 security consultancy: vulnerability management, identity hardening, zero-trust policy design and incident response.

Back to the main founder profile for the consultancy context, contact channels and headline credentials.

Background

His Head of IT background includes hardening a Microsoft 365 estate end-to-end: Intune device compliance lifted from 72% to 96%, Defender for Endpoint rolled out across the fleet, Conditional Access and MFA reshaped to remove legacy auth and break-glass exceptions tightened to a documented standard.

Led first-time Cyber Essentials Plus certification from inside the business and aligned the wider control set with ISO 27001 expectations, including evidence preservation, change-control and access-review cadences.

Reduced phishing and data-exposure incidents by 50% by tightening Defender for Office 365 policies, auditing inbox rules and forwarding, restricting OAuth app consent and rolling out sensitivity labels on collaboration surfaces.

Ran vulnerability management with Qualys and Microsoft Defender Vulnerability Management, prioritising remediation by exploit availability and business impact rather than raw CVSS, with named owners for each remediation track.

Hands-on penetration testing and network segmentation work to validate firewall rules, VLAN design and remote-access exposure rather than relying on assumed control posture.

Areas of capability

  • Vulnerability management and remediation prioritisation.
  • Endpoint security with Intune and Microsoft Defender for Endpoint.
  • Identity and access management with Entra ID, MFA and Conditional Access.
  • Zero-trust policy design and enforcement.
  • Firewall and IDS/IPS configuration on 1 Gb–10 Gb networks.
  • Encryption, key management and certificate-based authentication.
  • Incident response, forensics and post-incident control review.
  • Compliance work covering Cyber Essentials Plus, ISO 27001 and GDPR.
  • Secure scripting in PowerShell and Rust for automation.
  • Risk assessment and threat modelling for SME contexts.

How this shapes the consultancy work

The consultancy work today applies the same engineering discipline to client tenants: tighten the controls that actually carry risk, leave evidence behind, and hand the operating model back to internal IT or the incumbent supplier.

Other expertise backgrounds

  • Network Security ArchitectDesigns and hardens secure, high-performance networks: firewall configuration, intrusion detection, VLAN segmentation, zero-trust policy and translating business requirements into resilient, documented architectures.
  • Cloud EngineerArchitects and migrates workloads to Azure with deep systems knowledge, automation and cost discipline: hybrid identity, Intune Autopilot, infrastructure as code and resilient cloud-native operations.
  • IT ManagerHands-on IT leader with a decade managing teams, budgets and the full IT function across hybrid Microsoft 365 environments — service delivery, security compliance, vendor governance and team development.

© 2026 Magrathean UK Ltd. All rights reserved.

Registered in England & Wales: Company No. 16955343. Registered Office: 16 Caledonian Court West Street, Watford, WD17 1RY.