Hi, my name is

Sandor Tokesi.

I work on securing things in the cloud.

A passionate Security Architect focused on defending the cloud - in the cloud. I deploy Microsoft Sentinel and Defender solutions and develop new tools and services to ensure robust security measures in challenging environments.

Need assistance with your Sentinel deployment or migration? Or perhaps your SIEM costs are soaring? With experience in cost-value optimization of numerous Sentinel instances, I’m here to help. Feel free to reach out.

I specialize in automating and enhancing your SOC processes to elevate your cloud security, monitoring, and response capabilities. Let’s connect and take your cloud environment to the next level!

About Me

I have a keen interest in SOC process improvements, cloud security - focusing on Azure -, and Microsoft Sentinel. This blog is my platform to share my insights and findings.

Throughout my career, I’ve worn many hats - incident responder, threat hunter, detection engineer, and SOC engineer/architect. I’ve observed a notable gap in cloud-focused security, whether it’s about operating your infrastructure and tools within the cloud or leveraging cloud-based solutions for security purposes. Many security teams are not adequately prepared for effective monitoring and incident response in the cloud. This blog aims to address that by delving into these critical topics.

I’m passionate about sharing my deep technical knowledge of Sentinel. During my research and testing, I often uncover valuable findings that I share with Microsoft to help enhance their tools. You’ll find niche topics that go beyond the surface, providing actionable insights.

I’m also here to help with SOC process buildout, Sentinel improvements, cost optimization, and enhancing cloud security. I firmly believe that security is a balance between tool effectiveness and cost. If a solution is too expensive, it doesn’t matter how good it is. Optimizing your setup is crucial, and many of my blog posts focus on this.

Let’s connect and take your cloud security to the next level!

Here are a few key topics I'm dealing with recently:
  • Microsoft Sentinel
  • Microsoft Defender
  • Cloud Security
  • Azure DevOps
  • SOAR automation
  • SOC process design

Highlights

Microsoft SIEM Champion - 2024
Sentinel Badge
Microsoft SIEM Champion - 2024
Just earned my first SIEM Champion badge from Microsoft. Although I've been using Sentinel for quite a while, I recently began providing community feedback to better support the improvement of this SIEM.
Sentinel Phantom Fields: Expensive inaccessible data
Azure Cloud Sentinel Cost Blog
Sentinel Phantom Fields: Expensive inaccessible data
The blogpost explains how to avoid creating phantom fields in Sentinel - the method I used to save 2000 USD/day (on a PAYG pricing) for a company.

Experience in Cyber

Security Architect / Sr. Sentinel Engineer - BlueVoyant
2021 - present

As a Security Architect I’m working on developing new internal and external services and improving our existing ones. I research various security topics to improve our offerings both internally and for our clients.

Achievements:

  • Deployed, configured and optimized more than 60 Sentinel instances and supported the deployment of a few more.
  • By identifying under-documented behavior in Sentinel I saved significant costs for many companies.

As the first technical employee in the EMEA region for my company, I wore multiple hats for a considerable time. I assisted the sales and sales engineering teams in designing and selling our services, supported various teams in their duties, and worked on creating new services. My role also involved deploying and configuring Sentinel instances, developing deployment and SOAR automation content, and overall improving our services.

As our team expanded, my responsibilities transitioned from hands-on deployments to a role focused on researching and developing new capabilities, and supporting challenging deployments as an architect. Additionally, I design the monitoring and security architecture for our clients.

Technologies: Python, Powershell, Azure, Microsoft Sentinel, Microsoft Defender, Azure DevOps, Microsoft SecOps

Detection Engineer - IT Development Engineer - ABN Amro
2019 - 2020

In this role at one of the biggest dutch bank in Amsterdam, I had three distinct responsibilities:

  • Detection Engineering: Created detection use cases for Splunk, QRadar, and Sentinel.
  • Automation: Worked on automating security use cases, creating enrichment connectors, and integrating various tools with TheHive, Sentinel playbooks, and custom Python scripts.
  • Sentinel Deployment: Deployed Sentinel in a DATP configuration and developed an Infrastructure as Code deployment setup in Azure DevOps for our entire Sentinel environment.

Technologies: Python, QRadar, Splunk, Sentinel, Azure DevOps, TheHive

Sr. Incident Responder - GE
2018 - 2019

As an Incident Responder, I was responsible for investigating complex and challenging cases, conducting Windows forensic investigations, and creating detection rules in Splunk, Suricata, and Snort.

I led the night shift, ensuring smooth operations during off-hours, and took on the role of mentoring and training new team members.

This role enhanced my ability to swiftly and effectively handle incidents, while also encouraging teamwork and mentoring within the team.

Technologies: Splunk, Suricata, Snort, CrowdStrike

Cyber Security Analyst - IBM
2016 - 2018

This Cyber Threat Defense Analyst role marked the beginning of my career in cyber security.

I utilized QRadar to investigate security alerts for our clients, focusing exclusively on critical accounts. This allowed me to work on 1-2 clients at a time, enabling more in-depth investigations.

In addition to conducting investigations, I participated in on-site exercises with clients, offering guidance on how to tackle various use cases.

Network Engineer - Hungarian Telekom
2013 - 2016

In my network engineering role, I was responsible for configuring a range of network devices, including routers and switches. I managed the migration of IT services from legacy devices to modern appliances.

Achievements:

  • By automating the implementation tasks for these migrations, I enhanced efficiency by 300%, reducing an 8-hour task to just 2 hours.

Education

2014 - 2017
Masters of Science in Computer Science
Budapest University of Technology and Economics
  • Graduated with honor
  • Major: IT Security
  • Thesis topic: “Honeypot detection with fuzzing-based technologies”
2009 - 2014
Bachelor of Science in Computer Science
Budapest University of Technology and Economics
  • Major: Communication networks and technologies
  • Thesis topic: “BSc thesis topic: Network monitoring with honeytokens”

Get in Touch

My LinkedIn inbox is always open. Whether you have a question or just want to say hi, I’ll try my best to get back to you!