Matt W.

Chief Information Security Officer at Operation: Safe Escape
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Atlanta Metropolitan Area
Languages
  • English Native or bilingual proficiency
  • German Elementary proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 13 ratings
  • (13)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Chris C.

Matt Wyen is both skilled and knowledgeable in matters related to information technology and security. His depth and breadth of expertise makes him an asset to any organization, and he consistently amazes me with his creative solutions to problems. That's what makes him qualified, but that's not what sets him apart most. What sets Matt apart is his passion for technology and security, and also for helping others. He takes personal ownership for issues he identifies, and doesn't rest until they're resolved. Matt is an ideal candidate for any position in the field, and I recommend him unreservedly.

Jeff King

Matt is very knowledgeable in all areas of I.T. Very good with customers and a great problem solver. Would recommend Matt to any company interested in his services.

Rocky Belcher

I have known Matt Wyen for several years as a Board Member of a National Organization. During that time, he has impressed me as a "Can-Do" individual that demonstrates professionalism, compassion, enthusiasm, and amazing technical skills in the areas of Information Technology and Cyber Security. If you are looking for someone that works hard and works smart, I couldn't think of recommending anyone more. If you have any questions about Mr. Wyen, please do not hesitate contacting me via LinkedIn. - Rocky Belcher

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • McAfee ACCC Application Control and Change Control 8.1 Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee ATD Advanced Threat Def 4.10 Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee Agent 5.6 Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee Complete Endpoint Protection for Business Suite Bundle
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee Data Exchange Layer DXL 5.0 Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee Endpoint Security ENS 10.7 Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee FRP File and Removable Media Protection 5.0.1 Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee MDE Drive Encryption 7.2 Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee MVISION Endpoint Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee MVISION ePolicy Orchestrator Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • McAfee TIE Threat Intelligence Exchange 3.0 Essentials
    McAfee Enterprise
    Mar, 2021
    - Oct, 2024
  • Proofpoint Threat Response Auto-Pull (TRAP) Administration – Level 1
    Proofpoint
    Mar, 2021
    - Oct, 2024
  • McAfee EPolicy Orchestrator 5.10 Essentials
    McAfee Enterprise
    Feb, 2021
    - Oct, 2024
  • Metasploit Pro Certified Specialist
    Rapid7
    Dec, 2019
    - Oct, 2024
  • How to Use ExploitDB (BSWJ)
    Cybrary
    May, 2019
    - Oct, 2024
  • Social Engineering
    Cybrary
    May, 2019
    - Oct, 2024
  • Fundamentals of Vulnerability Management
    Cybrary
    Jan, 2019
    - Oct, 2024
  • NeXpose Vulnerability Management
    Cybrary
    Jan, 2019
    - Oct, 2024
  • InsightVM: Advanced Vulnerability Manager
    Rapid7
    Oct, 2018
    - Oct, 2024
  • Intro to Infosec
    Cybrary
    Sep, 2018
    - Oct, 2024
  • InsightVM Certified Administrator
    Rapid7
    Aug, 2018
    - Oct, 2024
  • Cybersecurity for IT Professionals
    LinkedIn
    Jul, 2018
    - Oct, 2024
  • IT Security Foundations: Network Security
    LinkedIn
    Jul, 2018
    - Oct, 2024
  • Cybersecurity Foundations
    LinkedIn
    Jun, 2018
    - Oct, 2024
  • IT Security Foundations: Operating System Security
    LinkedIn
    Jun, 2018
    - Oct, 2024
  • IT Security Foundations: Core Concepts
    LinkedIn
    May, 2018
    - Oct, 2024
  • Veeam Sales Professional (VMSP)
    Veeam Software
    Jul, 2016
    - Oct, 2024
  • Veeam Technical Sales Professional (VMTSP)
    Veeam Software
    Jul, 2016
    - Oct, 2024
  • MCPS: Microsoft Certified Professional
    Microsoft
    Dec, 2015
    - Oct, 2024
  • Proofpoint Threat Response Auto-Pull - Level 1
    Proofpoint
    Jul, 2020
    - Oct, 2024
  • Proofpoint TAP SaaS Defense - Level 1
    Proofpoint
    Jun, 2020
    - Oct, 2024

Experience

    • United States
    • Individual and Family Services
    • 1 - 100 Employee
    • Chief Information Security Officer
      • Oct 2018 - Present
    • Individual and Family Services
    • Board Member
      • 2019 - Present

      The Coalition Against Stalkerware convened in 2019 in order to facilitate communication between those organizations working to combat domestic violence and the security community. The founding organizations have committed to fighting domestic violence, stalking, and harassment by addressing the use of stalkerware and raising public awareness about this issue. The Coalition Against Stalkerware convened in 2019 in order to facilitate communication between those organizations working to combat domestic violence and the security community. The founding organizations have committed to fighting domestic violence, stalking, and harassment by addressing the use of stalkerware and raising public awareness about this issue.

    • United States
    • Packaging and Containers Manufacturing
    • 700 & Above Employee
    • Global Manager, Threat and Vulnerability
      • Oct 2019 - Present

      Responsible for identifying internal and external risks that could affect the security posture of the organization, including the confidentiality, integrity, and availability of its systems and assets. Identifying vulnerabilities and weaknesses in systems, applications, processes, networks. Testing for exploitability, potential vectors of compromise and responsible for aligning people, process, and technology to meet demand & business requirements enterprise-wide while being responsible for the assessment and measurement of the effectiveness of Information Security controls designed to protect assets and secure data. Designed, coordinated, and executed technical vulnerability assessments for all aspects of the company to include, but not limited to network and security infrastructure, servers, workstations, web and application delivery servers, databases, applications, processes, and cloud-based vendors. Full scope assessments of/for server and client-side attacks, web application exploitation, Advanced Persistent Threat (APT) threats, and the tools and techniques leveraged therein. Maintain all tools used in the scanning and identification of vulnerabilities, as well as the tools used to rationalize, consolidate, and apply additional contextual information in other security tools. Identified and assessed specific emergency or priority vulnerabilities, guided by input from other elements (cyber intelligence and manufacturer recommendations), and suggested specific remediation approaches. Coordinated with the Security Architecture team to provide updates to security standards and templates as required to meet new regulatory/audit/etc. requirements. Provided detailed management level reporting and dashboards designed to demonstrate consistency against expected control outcomes, including compliance obligations. Maintained business relationships with key partners across the company with the intention of driving improvements in operational security. Show less

    • China
    • Automotive
    • 1 - 100 Employee
    • Vulnerability Analyst
      • May 2018 - Oct 2019

      Heavily working with Rapid7's InsightVM Security Vulnerability Management Platform Planning and Deployment of InsightVM Security Consoles/Engines Reporting and Analysis with Varonis DatAdvantage • Assists in the planning and execution of vulnerability scans of organization information systems • Analyzes data from threat and vulnerability feeds along with patch management results and analyzes data for applicability to the organization • Generates reports on assessment findings and summarizes to facilitate remediation tasks • Implements and coordinates remediation steps across technical verticals and develops and implements plans to prevent recurring vulnerabilities • Effectively works across teams to remediate issues – perpetually reducing threat landscape • Refines focus – tool tuning of the Vulnerability scanning tool • Adheres to applicable Information Security Policies and Procedures • Monitors remediation progress and updates tracking mechanisms accordingly; keeps monitoring software/systems up-to-date • Interface with internal stakeholders on vulnerability management issues • Stays current on emerging threats and associated remediation steps as well as the ever changing information security world • Ensures compliance with all applicable configuration standards • Manages enterprise vulnerability assessment and configuration assessment reports as well as patch management reports • Identifies and resolves false positive findings in assessment results • Documents exceptions and gains stakeholder approvals as required by policy • Performs compensating controls analysis and validates efficacy of existing controls • Recommends security controls and/or corrective actions for mitigating technical and business risk • Produces vulnerability, configuration, and coverage metrics and reporting to demonstrate assessment coverage and remediation effectiveness against the standards Show less

    • Information Technology & Services
    • Interim CIO
      • Jan 2018 - May 2018

      Performed a variety of responsibilities including Security Operations, Systems Administration, Network Administration, Management, Consultant, and MSP Sales Performed a variety of responsibilities including Security Operations, Systems Administration, Network Administration, Management, Consultant, and MSP Sales

    • Presales Engineer
      • May 2017 - Jan 2018

      https://metrodatacenter.com https://metrodatacenter.com

    • Strategic Management Services
    • Technical Advisor
      • Sep 2016 - Jan 2018
    • Co-Owner & CTO
      • Mar 2016 - Jan 2018

      E.P.I.C. – Technical Advisor Metro Data Center – Pre-Sales Engineer E.P.I.C. – Technical Advisor Metro Data Center – Pre-Sales Engineer

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • I.T. Engineer
      • Sep 2015 - Mar 2016

      Documentation Management & Best Practice Administration I.T. Support Dell Partner / Managed Services Partner Active Directory, Office 365, Exchange Management Documentation Management & Best Practice Administration I.T. Support Dell Partner / Managed Services Partner Active Directory, Office 365, Exchange Management

    • Director of I.T.
      • Dec 2013 - Aug 2015

      Management of IT Department and Operations, Budgeting & Cost Control, Vendor Relations, Systems Integration, Infrastructure Deployment, Strategic IT Planning, Site Deployment over various locations throughout Ohio Management of IT Department and Operations, Budgeting & Cost Control, Vendor Relations, Systems Integration, Infrastructure Deployment, Strategic IT Planning, Site Deployment over various locations throughout Ohio

    • Retail Office Equipment
    • I.T. Consultant
      • Feb 2012 - Aug 2015

      consulting staff defining objectives determining information system requirements making recommendations compiling and presenting information writing reports and documentation installing IT systems and software repairing computer problems and removing viruses training users answering feedback consulting staff defining objectives determining information system requirements making recommendations compiling and presenting information writing reports and documentation installing IT systems and software repairing computer problems and removing viruses training users answering feedback

    • United States
    • Hospitals and Health Care
    • 700 & Above Employee
    • Customer Technology Support
      • Sep 2014 - Dec 2014

      [CSOS] - Controlled Substance Ordering System, Rx, Medical Supply, Specialty Supply support Mobile Support WebEx, Phone and Email Support [CSOS] - Controlled Substance Ordering System, Rx, Medical Supply, Specialty Supply support Mobile Support WebEx, Phone and Email Support

    • India
    • 1 - 100 Employee
    • Digital Technical Support
      • Jul 2014 - Sep 2014

      Short Term Contract Technical Support for K - 12 Students/Teachers/Administrators Utilizing SalesForce in Combination with Avaya products to manage and create cases for emails and phone calls Working with a multitude of Mcgraw-Hill Education products such as ConnectED and Connect+ and Thousands of Software CD's Respond to Customer inquiries by applying call to resolution techniques Supporting other DTS Agents via Chatter and Pidgin with technical Knowledge Product Research Account Management Licensing Management District Management Show less

    • United States
    • Construction
    • 1 - 100 Employee
    • Technical Support Representative
      • Mar 2012 - Feb 2013

      Report creation and layout modification using Dev Express Report tool Creation of documentation regarding Client details, internal Procedures to resolve issues Billing and Support Ticket Statistics utilizing ZenDesk Help Desk system Rail/Freight Yard Topography Historical Data Management and Retrieval Custom Rail Tracking Software Management & Support Training Clients to use our Advanced Rail Tracking Software Customer Support over the Phone, Email and Remote Control Heavy Data Management and Set-Up for new Clients as we train them to use the Rail Tracking Software Properly Directly work with Class-1 Railroads (UP, Railinc, BNSF, CN, CPRS, CSXT, KCS, NS and Kleinschmidt) Creation and Modification of Microsoft SQL queries to Modify, Research, Manage and Create Data Show less

Education

  • Wright State University
    Pursued a Bachelor’s Degree in Computer Science & Engineering, Computer Science
    2013 - 2014
  • Quinebaug Valley Community College
    Pursued an Associate’s Degree in Computer Networking, Computer Networking
    2009 - 2010
  • Harvard H Ellis Regional Vocational Technical School
    Electronics Diploma & GED in Industrial Electronics Technology/Technician, Industrial Electronics Technology/Technician
    2004 - 2008

Community

You need to have a working account to view this content. Click here to join now