Network Security Architect | Gyorgy Bolyki
Designs and hardens secure, high-performance networks: firewall configuration, intrusion detection, VLAN segmentation, zero-trust policy and translating business requirements into resilient, documented architectures.
Back to the main founder profile for the consultancy context, contact channels and headline credentials.
Background
Designed and executed a 1 Gb to 10 Gb network upgrade in collaboration with Cisco engineers, sequencing the rollout to avoid service interruption and re-validating segmentation, firewall rules and high-availability paths after each phase.
Configured access points, wireless networks and remote-access pathways with strong identity binding to Entra ID and Conditional Access, reducing the dependency on static credentials.
Implemented intrusion detection and prevention systems with log-driven tuning rather than vendor defaults, removing alert noise that internal teams cannot triage.
Conducted vulnerability assessments and structured penetration tests to evaluate real network resilience rather than assumed control posture.
Documented the resulting network architecture, change history and disaster recovery procedures so that the operating model can be inherited by an incumbent MSP, internal IT successor or auditor without re-discovery work.
Areas of capability
- Network architecture and design across 1 Gb–10 Gb infrastructure.
- Firewall, access point and remote-access configuration.
- Intrusion detection and prevention system tuning.
- VLAN segmentation, routing and switching protocol selection.
- VPN and remote-access design with strong identity binding.
- Penetration testing and network vulnerability assessment.
- Zero-trust policy and segmentation modelling.
- Encryption, certificate management and access control mechanisms.
- Disaster recovery and business continuity planning.
- Documentation, governance and supplier handover.
How this shapes the consultancy work
On the Microsoft 365 side, the same architectural discipline shapes Conditional Access policy design, device-trust integration and the boundary between cloud control plane and on-premises network so that security posture survives audit and supplier change.
Other expertise backgrounds
- Cybersecurity Engineer — A decade of practical security engineering work behind the Microsoft 365 security consultancy: vulnerability management, identity hardening, zero-trust policy design and incident response.
- Cloud Engineer — Architects and migrates workloads to Azure with deep systems knowledge, automation and cost discipline: hybrid identity, Intune Autopilot, infrastructure as code and resilient cloud-native operations.
- IT Manager — Hands-on IT leader with a decade managing teams, budgets and the full IT function across hybrid Microsoft 365 environments — service delivery, security compliance, vendor governance and team development.