Presently I am working as an Information Technology Specialist (INFOSEC) specifically an Information Systems Security Manager (ISSM) with the Department of Homeland Security supporting the Countering Weapons of Mass Destruction (CWMD). Prior to this I worked as an ISSO with 2 other Government Contractors. During this time I have acquired an excellent knowledge in the Information Security area. My responsibility includes and has included providing support for the IAO/ISSO duties, system administrator duties as well as client support. I believe the IT Security field is one that requires consistently being built upon. There is quite a bit of work that needs to be done and I would like to be a part of it. As I grow in the field branching into Cyber Security will be a natural next step. Additionally continuing to grow in the Program Management/Project Management field is also a must. I believe this field requires passion and commitment and these are qualities I possess no matter what career choice.I look forward to any and all challenges within my Information Technology career. I am not afraid of a challenge and welcome additional growth as a Supervisor. I believe no position and the person supporting it should be a single point of failure. I believe that it is important to use the strengths of all team members. Each person can be a viable part of the team and a good leader must also be willing to follow as well as lead.Please understand at this time I am currently a Doctoral Candidate and am very busy completing the requirements towards receiving my Doctor of Management Degree. While I am very happy to consider other opportunities, my classwork takes priority. Thank you for your continued interest.
Dhs Countering Weapons Of Mass Destruction
-
Dhs Countering Weapons Of Mass DestructionWoodbridge, Va, Us
-
Information Systems Security ManagerFederal Government Dec 2008 - Present
-
Information Systems Security ManagerDhs Countering Weapons Of Mass Destruction Sep 2016 - Present
-
Information Systems Security Manager (Issm)Dhs Domestic Nuclear Detection Office Sep 2016 - PresentImplements Department information security policies, procedures, and control techniques to address applicable Federal, Departmental, and DNDO requirementsDevelops and publish procedures necessary to implement the requirements of DHS information security policy the IT InfrastructureEnsures that the security plan and risk assessments of the IT Infrastructure are updated-and systems re-authorized if warranted-whenever major modifications significantly impacting risk are made to IT Infrastructure systems, physical environments, interfaces, or user communityEnsures currency and accountability for access authorizations-disables IT Infrastructure user accounts and suspend access privileges, including access to email, for those users who have not completed annual refresher training, unless a waiver is granted by you or the DNDO CISO. Oversees Privacy and Privacy-related security controls. Ensures ISSOs review audit records for IT Infrastructure systems hosting or processing Personally Identifiable Information (PII) no less than monthly and report unusual activity or unexplained access attempts to you, the DNDO CISO, and the cognizant System OwnerEnsures that only DHS-owned removable media are connected to the IT Infrastructure, unless the AO has determined that the risk is acceptable based on compensating controls and acceptable use guidance has been published and approved by the ISSM or the DNDO CISOEnsures that only equipment that is owned or leased by the Federal Government, or operated by a contractor on behalf of the Federal Government, may be connected to the IT Infrastructure unless you, the DNDO CISO, or the DNDO Authorizing Official approve such interconnection, in writingManages all activities relating to requests for Vulnerability Assessment Team (VAT) assistance in support of incidents, internal and external assessments, and on-going Systems Engineering Life Cycle support
-
Tier Ii Hardware And SoftwareChameleon Integrated Services Dec 2015 - Mar 2019Saint Louis, Mo, UsProvides professional and technical support services to troubleshoot customer personal computers (desktops/laptops), desktop/laptop applications and desktop connectivity. Report changes, resolutions and unresolved problems.Provides professional and technical support services for installations and set-up of software, laptops and desktops, computer monitors and other peripherals, printers/copiers networked and stand alone, and all other associated hardware componentsProvides professional and technical support services to administer personal laptop and desktop computer software changes, software updates and maintain the operational status of computing equipment in accordance with established implementation guidanceComplies with and supports ITIL change-incident-problem management processes and work instructions.Troubleshoots and resolves trouble tickets related to technical difficulties with hardware, software, and the network and remotes into user machines as required to provide assistance and supportObserves and responds to Government users requests for support, resolves trouble tickets and defines, isolates and resolves personal computer operating problems, failures, and malfunctionsMonitors the tracking, documentation, and closing of all problems and resolutions using the established processes and technology implemented by DISA using Remedy with clear, concise and updated case note complianceTroubleshoot user problems with Microsoft Windows, Microsoft Office, and other applicationsWhen the restoration is beyond the scope of Tier 2 Desktop Support, ensures proper escalation to Tier 3 SupportInstalls, configures, upgrades and troubleshoots hardware and software within a networking systemImplements patches and corrective actions needed to mitigate security risks and vulnerabilities to desktops and laptops -
It Specialist (Infosec)Customs And Border Protection Dec 2009 - Sep 2016Plan, coordinate, and implement security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of informationDevelop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needsDocument computer security and emergency measures policies, procedures, and testsPerform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measuresAct as a technical project lead or provide work leadership for lower level employeesPerforms risk assessments and security testing. Applies knowledge of information systems security (INFOSEC) principles to network protocols and architecturesEnsure that security requirements for the major application or general support system is metEnsure that requests for certification and accreditation of computer systems are completed in accordance with published proceduresEnsure that protective measures for physical security theats are in placeEnsure compliance with all legal requirements concerning the use of commercial proprietary softwareMaintain an inventory of hardware and software within the program/development offices or field site facilitiesCoordinate the development of a Contingency Plan and ensure that the plan is tested and maintainedEnsure risk analyses are completed to determine cost-effective and essentail safeguardsEnsure preparation of security plans for sensitive systems and networksReport security incidents not involving IT resources to the appropriate security officeProvide input to appropriate IT security personnel for preparation of reports to higher authority concerning sensitive and/or national security information systems
-
Tier 2/Tier 3 Hardware/Software Technician LeadNova Corporation May 2014 - Dec 2015Serves as top escalation Tier and technical lead on the Support Team to implement and maintain appropriate policies and procedures for team efficiency and productivity by highlighting deficiencies and recommending changes in tools, processes, reporting and employee engagement. Works with management to plan and implement recommended changes. Prioritizes and schedules IT requests and escalate issues to senior operations staff when required. Provide 2nd and 3rd level support for staff by responding to requests within specified service level agreements. Works with senior staff to ensure operational efficiency. Assists in installing and upgrading software, installing hardware, and configuring systems and applications. Coordinates and implemnets equipment repairs with the team. Manages, monitors and remediates client software deployments, windows patching and Antivirus posture. Ensure ssecure desktop and network configuration, policies and practices. Assists in performing IT-related tasks including: running hardware diagnostics, troubleshooting hardware and printer functionality, configuring hardware for new users, maintaining computer equipment and supplies inventory. Assists in network infrastructure implementation and deployment as required.
-
Senior Systems AdministratorOaktree Solutions Aug 2010 - Apr 2014Under general direction, responsible for activities related to system administration. Assigns personnel to various projects, directs their activities, and evaluates their work. Ensures long-term requirements of systems operations and administration are included in the overall information systems planning of the organization. Responsible for the installation, maintenance, configuration, and integrity of computer software. Implements operating system enhancements that will improve the reliability and performance of the system.
-
Information Systems Security OfficerQinetiq North America Mar 2009 - Dec 2009Mclean, Virginia, UsAs ISSO provides guidance and oversight to IS users in the interpretation and implementation of security policies and procedures. -
IssoSignature Government Solutions Aug 2008 - Mar 2009UsResponsible for and provides oversight of ISSO/IA related issues at multiple operating sites. Liaisons and coordinates ISSO requirements and related issues with Senior Leadership. Works in conjunction with the on-site leadership and determines and works requirements with the ability to prioritize, provide advisement, organize, and multi-task. Supervised three IAS/ISO personnel when their activities relate to computer and network systems security within the organization. Performs computer systems analysis, specifications, development, implementation, documentation, database administration, life-cycle management activities and system security certification. Develops, maintains and administers necessary databases to accurately monitor, maintain and manage reporting required by the Command and per regulation for Top Secret and Sensitive Compartmented Information (TS/SCI) and collateral LAN/WANs, access rosters, audit trails and equipment locations. Provides ISSO supervision and oversight over transfer and operation of equipment at fixed sites and during the conduct of numerous off-site U.S. based training exercises.
Leslie Porter Education Details
-
University Of PhoenixInformation Systems -
University Of PhoenixInformation Technology
Frequently Asked Questions about Leslie Porter
What company does Leslie Porter work for?
Leslie Porter works for Dhs Countering Weapons Of Mass Destruction
What is Leslie Porter's role at the current company?
Leslie Porter's current role is Information Security Professional/ Doctoral Candidate.
What schools did Leslie Porter attend?
Leslie Porter attended University Of Phoenix, University Of Phoenix.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial