Matt Coughlan
Details
Security and Risk Analysis - Cyber Security Option
Penn State University
2017 : 2021
2023 : Present
UPMC
Security Operations Analyst
Information Security Analyst working in the Security Operations Center supporting UPMC Healthcare. Responsible for investigating information security related events. Diligently evaluating potential malicious attacks by identifying the root of the attack and responding to the methods used to implement counter measures, in real time, to restore system to normal operations. Tasked with monitoring user activity and network events with security tools, such as SIEM and EDR, to identify security events and determine if the activity is expected or abnormal and to respond accordingly. Contributing member on the SOAR automation team to help develop incident response playbooks to increase response time for potential malicious events. Acted as an escalation point for the Help Desk for security related issues, such as website blocks, MFA issues, or various other security related tickets.
2021 : 2023
eNGINE
Information Security Analyst
Performed installation, troubleshooting, and repair of access control systems, security cameras, and related networking devices such as PoE locksets, routers, switches, and UPS systems. Monitored access control systems for potential security threats using the RS2 AccessIt! Platform. Triaged alerts and warnings triggered in RS2 AccessIt! to determine risk level and remediation. Conducted bi-yearly physical vulnerability assessment of access control hardware and systems. Documented vulnerabilities and remediation in lessons learned after-action reports. Worked closely with Network Operations Center teams to troubleshoot networking issues with switches, routers, and both wired and wireless locksets and cameras.
2019 : 2021
University of Pittsburgh
Security Technician - Integrated Security Department
Organized and maintained customer work records for internal business accounting and state and federal regulatory agencies. Corresponded with customers in-person and by phone regarding repairs, billing information, and various other general inquiries. Performed mechanical diagnostics, repairs, and maintenance on a wide variety of vehicles. Conducted state inspections and emissions tests
2016 : 2019
Green Apple Auto Works
Automotive Technician / Automotive Service Writer
Provided year-round landscaping services to both residential and commercial customers. Solicited new clients, corresponded with existing clients, conducted cost estimates, managed schedules and budgets, expanded sales territories, organized promotions and advertisements, invoiced clients, collected payments, kept detailed records of debts and accounts. Sold the company, equipment, and existing customer contracts to a larger company for a profit.
2012 : 2015
Matt's Mowing and More
Business Owner
Skills
Cloud Administration, Cloud Security, Communication, CompTIA, Computer Forensics, Critical Thinking, Crowdstrike Falcon, Cryptography, Customer Service, Cyber Risk Management, Cybersecurity, Disaster Recovery, Endpoint Security, Identity & Access Management (IAM), Incident Handling, Incident Investigation, Incident Response, Information Security, Kali Linux, Leadership, Microsoft Office, Nessus, Network Design, Network Security, Network Security Implementation, NIST, Nmap, OS X, Palo Alto Networks, Palo Alto Networks Cortex, Physical Security, Risk Management, Secure Coding, Security Compliance, Security Incident Response, Security Information and Event Management (SIEM), Security Policy, SOAR, Software Development Security, Splunk, Splunk Enterprise Security, Teamwork, Technical Analysis, Technical Documentation, Threat & Vulnerability Management, Threat Detection, Time Management, Troubleshooting, Virtual Machines, Vulnerability Assessment
About
I am drawn to technology and possess the security-first mindset, which is part of why my interests lie within the realm of cybersecurity. I am passionate about learning and working in an environment that is always growing and evolving. I am intrigued by the constantly changing nature of technology, but more specifically the cat and mouse game that comes along with cybersecurity. The intense nature of having to outthink your opponent by finding system vulnerabilities and remediating before a malicious actor finds it first.