Stephen Le Bel Email and Phone Number
Stephen Le Bel work email
- Valid
- Valid
- Valid
Stephen Le Bel personal email
- Valid
- Valid
- Valid
- Valid
- Valid
IT Assurance engineer: automating workloads to achieve higher standards or to reduce cost. Some people bring together people, an IT Assurance engineer brings together IT assets in a form that considers business continuity, security, and company goals. Deploying security software with the client needs in mind to meet their needs at their maturity level. I began copying code out of magazines as an 8-year-old. I believe that, in maintaining technical proficiency in each of these areas I have worked in, has truly made me an effective engineer, specializing in defensive IT security development, deployment and overall IT risk assessment. I provide timely, professional, security data points that are relevant to business operation and reputation by deploying custom or best in class solutions.
-
Cyber Security Delivery ManagerAccenture Federal ServicesHouston, Tx, Us -
Director Of Cyber Security Special OperationsAmsys Innovative Solutions Jan 2020 - PresentHouston, Tx, UsSecurity Program management for AMSYS and AMSYS clients. Security architecture consulting. Security Orchestration via API’s and built reporting dashboards for threat hunting, investigations and status reports. Reviewed system diagrams, interviewed stakeholders and documented findings, remediation plans and process optimizations for operations. Trained junior testers in Metasploit, Zed, Burp, NMAP, Kali linux tooling and custom web application proxies, using open source penetration testing frameworks. -
Security Architect, Software Author, R&D LeadSecuritykeys Feb 2017 - Jul 2018Authoring the application of proprietary machine learning algorithms for use in cyber security operations centers. Industry TTP R&D for behavioral model development. Software engineering for “big data” analytics using cost effective data interrogation. Using kNN, RNN/CNN, NLP and many other highspeed algorithms to introduce layered and effective new data points.
-
Sr. Security EngineerEllucian Mar 2013 - Jan 2016Reston, Va, UsDaily vulnerability assessment, threat assessment, mitigation and reporting activities for clients in order to safeguard information assets. Vulnerability scanning on IS to ensure protection has been put in place on those systems Monitor virus protection within Company and clients infrastructure and any pending virus threats outside the environment. Conducting remote administration to include managing accounts, passwords, server updates, patching, and backups of servers. Providing incident response functions when appropriate and coordinate activities with site personnel when directed by senior staff. Conducting research pertaining to the latest viruses, worms, etc. and the latest technological advances in combating unauthorized access to information. Writing guidelines, standards, policies, procedures and other technical documentation. Supporting Information Assurance asset deployments, upgrades, and maintenance; including servers, databases, network assets and wireless LAN security. Assessing and reviewing current technology infrastructure to identify key risks areas, and ensure adequate level of control are in place to address those risks. Recommending technological and architectural upgrades/modifications to company's Information Systems Security architecture. -
It Security ConsultantAgilex Technologies Jun 2012 - Oct 2012
-
Sr. Ia Security EngineerBrandon Technology Consulting, Inc. Nov 2011 - Jun 2012Goodlettsville, Tn, UsDeveloped and prepared critical reports for senior officials for certification and accreditation of both commercial and government networks. Used Department of Defense Information Assurance Security and Accreditation Process (DIACAP) process to audit the security practices of networks processing government data. Worked with onsite technicians to suggest solutions to their compliance issues. Quickly became the go to SME on .Net, IIS, Apache, UNIX/*nix, MS SharePoint, and Databases (MS/MySQL, DB2, Oracle).Key Contributions:● Subject matter expert for a team of auditors regarding numerous specialties.● Trained new personnel in HP Security Suite, Retina, AppDetective, Burpsuite and Web Inspect.● Assisted in recruiting new quality personnel. -
Sr. Computer Systems Security EngineerLockheed Martin Jun 2010 - Nov 2011Bethesda, Md, UsDeveloped and prepared critical reports for senior Air Force officials for certification and accreditation of Air Force Information Technology networks. Used Air Force and DIACAP and the IT-Lean process to identify operational threat, security architecture, and analysis of cutting edge software and hardware. Worked with the Vulnerability assessment team to set up and use Retina Remote Enterprise Manager to increase performance of network scanning. Consulted with the Risk Assessment team to optimize workflow and created tools to increase management’s visibility of the process. Certified in Emission security and worked with Air Force National Capital Region units to manage TEMPEST security. Worked with Information Technology US Army to create resolutions to POA&M’s for Air Force C&A packages. -
Information Management OfficerUs Army Oct 2006 - Apr 2010Arlington, Virginia, UsMaintained 300+ computers for combat operations by AH-64s (Apaches) on multiple networks. Worked with sections to develop a battle planning system, incorporating all available software. Planned and set-up equipment for a 1.5 mile WiFi shot, to enable testing pilots to send real-time data to the Battle Captain and commanders. Maintained the largest map server deployed (2009). Assisted users and supporting administrators in optimizing work-flow and security standards. Ensured that all security systems were set up properly, upgraded or replaced. These systems included Cisco Routers, Symantec, IA evaluations, Software Approval, Multi-segment Exchange Servers, Backup systems, Data Management, Remedy (for documentation), and Remedy scripting. While deployed, I quickly became the Cyber Warfare subject matter expert.Key Contributions:● Created custom software to investigate and document vulnerability and security events.● Assisted users with initial setup of network and management systems.● Provided training on a one on one basis to improve or fix workflow.● Provided 100% uptime to critical users.● Protected multi segment networks by identifying major threats before 0 day.● Medically Retired for combat zone injuries with awards, medals and Honors -
Computer Systems Engineering / Internet AdvertisingSelf Employed May 2003 - Jan 2006Setup and maintained advertising servers. Implemented cached ad resourcing to increase from 2000 ads per hour to over 15000 per hour. Used unix servers to both protect and serve E-mails, pop-ups, and banners. Setup IDS both passive and intrusive. Managed high capacity traffic routers, and load balancing servers to maintain the required up times. Set up secure traffic locations for commercial websites. Managed HOT, COLD, and offsite storage using incremental, and differential backup systems.Key Notes:● Worked directly with ISP’s to solve both network and security issues.● Designed data flow tracking for customers to see their traffic in real time. (SQL, PHP, Shell scripting)● Tested and prevented many DOS and other nefarious software attacks.● Used Snort, nmap, Ethereal (WireShark), and other security assessment software.
Stephen Le Bel Skills
Stephen Le Bel Education Details
-
Full Sail UniversityDigital Media -
St. Andrew’S School, Wears Valley Tn
Frequently Asked Questions about Stephen Le Bel
What company does Stephen Le Bel work for?
Stephen Le Bel works for Accenture Federal Services
What is Stephen Le Bel's role at the current company?
Stephen Le Bel's current role is Cyber Security Delivery Manager.
What is Stephen Le Bel's email address?
Stephen Le Bel's email address is ar****@****ail.com
What schools did Stephen Le Bel attend?
Stephen Le Bel attended Full Sail University, St. Andrew’s School, Wears Valley Tn.
What are some of Stephen Le Bel's interests?
Stephen Le Bel has interest in Children, Civil Rights And Social Action, Education, Poverty Alleviation, Science And Technology, Disaster And Humanitarian Relief, Arts And Culture.
What skills is Stephen Le Bel known for?
Stephen Le Bel has skills like Active Dod Secret Clearance, Dod, Cissp, Security+, Information Security Management, Information Assurance, Air Force, Army, It Audit, Hvac, Cisco Security, Help Desk Implementation.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial