AeroLeads people directory · profile

Scott L. Email & Phone Number

Cybersecurity Professional | CISSP at Boeing Intelligence & Analytics
Location: Huntsville, Alabama, United States 9 work roles 2 schools
1 work email found @lpl.com LinkedIn matched
✓ Verified May 2026 4 data sources Profile completeness 100%

Contact Signals · 1 work email

Work email s****@lpl.com
LinkedIn Profile matched
3 free lookups remaining · No credit card
Role
Cybersecurity Professional | CISSP
Location
Huntsville, Alabama, United States

Who is Scott L.? Overview

A concise factual answer block for searchers comparing this professional profile.

Quick answer

Scott L. is listed as Cybersecurity Professional | CISSP at Boeing Intelligence & Analytics, based in Huntsville, Alabama, United States. AeroLeads shows a work email signal at lpl.com and a matched LinkedIn profile for Scott L..

Scott L. previously worked as Lab Systems Security Engineer / Information Systems Security Officer (ISSO) at Boeing Intelligence & Analytics and Senior Threat & Vulnerability Management Engineer at Babylon. Scott L. holds Master Of Science - Ms, Cybersecurity And Information Assurance from Western Governors University.

Company email context

Email format at Boeing Intelligence & Analytics

This section adds company-level context without repeating Scott L.'s masked contact details.

*@lpl.com
68% confidence

AeroLeads found 1 current-domain work email signal for Scott L.. Compare company email patterns before reaching out.

Profile bio

About Scott L.

Highly accomplished Cybersecurity Professional with 16+ years of experience providing mission-critical military and private-sector initiatives and solutions for classified and/or critical business operations. Proven ability to seamlessly coordinate and direct all phases of project-based efforts. Successful history of leading, training, and mentoring teams to exemplary performance.

Listed skills include Information Assurance, Security, Network Security, Security+, and 43 others.

Current workplace

Scott L.'s current company

Company context helps verify the profile and gives searchers a useful next step.

Boeing Intelligence & Analytics
Boeing Intelligence & Analytics
Cybersecurity Professional | CISSP
AeroLeads page
9 roles

Scott L. work experience

A career timeline built from the work history available for this profile.

Lab Systems Security Engineer / Information Systems Security Officer (Isso)

Current

Annapolis Junction, MD, US

Nov 2023 - Present

Senior Threat & Vulnerability Management Engineer

London, GB

  • Deployed cloud security solutions and controls to cover 100% of multi-cloud infrastructure environment for vulnerability management, asset/resource visibility, and identification of toxic combinations such as clear.
  • Administered the Endpoint Detection and Response (EDR) platform and leveraged existing vulnerability identification and reporting capabilities, which allowed the removal of redundant vulnerability management tools.
  • Monitored compute, container, and end-user assets to ensure compliance with company policies, regulatory requirements, and industry best practices. Coordinated remediation of software, operating system, and package.
  • Developed various SIEM dashboards to facilitate reporting and metrics capabilities for the Security Operations team and self-serve vulnerability dashboards for other business units, allowing them on-demand access to.
Dec 2021 - Aug 2023

Sr. Information Security Engineer

San Diego, CA, US

  • Research new and emerging threats and detected vulnerabilities in order to provide technical subject matter expertise and coordinate remediation efforts with internal business partners and external stakeholders to.
  • Validate reported and discovered vulnerabilities with automated scanning tools, scripts, exploit code, and other means from within and outside the network to determine exposure and possible attack vectors.
  • Administer, support, and troubleshoot enterprise vulnerability assessment tools and systems, including infrastructure testing, host-based third-party application identification, application code scanning, external.
  • Identify opportunities to tune and optimize vulnerability assessment tools to increase efficiency and decrease false positives and false negatives, upgrading or replacing individual tools or components when necessary.
  • Developed and operationalized the firm’s deep, dark, and clear web monitoring program, including use case and playbook documentation and integration of alerts, monitoring, and remediation into the Security Operations.
  • Create and present firm-wide and targeted Security Awareness training sessions to raise employee awareness of the methods used by attackers to gain unauthorized access to company systems and data via phishing and other.
Apr 2017 - Dec 2021

Information Security Analyst

Philadelphia, PA, US

  • Performed vulnerability assessments on infrastructure systems and applications using automated tools and manual methods to determine level of exposure and risk to the organization.
  • Prioritized vulnerability remediation based on industry standard risk scoring methodologies and business criticality of impacted systems.
  • Develop and report operational and executive-level metrics to increase visibility and awareness of known vulnerabilities and remediation efforts.
Oct 2016 - Mar 2017

Cyber Security Manager/Engineer

Washington, DC, US

  • Designed, implemented, and monitored security measures for communication networks supporting more than 2,400 personnel, managed a team of more than 25 personnel and ensured that systems and personnel adhered to.
  • Drafted, submitted, and maintained certification and accreditation (C&A) and Authority to Operate/Connect (ATO/ATC) documentation for multiple garrison and deployed networks and systems.
  • Conducted continuous inspections and vulnerability scans to ensure compliance and minimal risk.
  • Developed, deployed, and managed Intel/McAfee endpoint security policies and configuration including anti-malware/anti-virus, host-based intrusion prevention system (HIPS) and firewall, rogue system detection, and data.
Dec 2013 - Aug 2016

Cyber Security Technician/Analyst

Washington, DC, US

  • Served as Team Leader for the deployable Cybersecurity tool suite; responsible for the installation, configuration, and operation of network security equipment, including firewalls, intrusion detection systems (IDS).
  • Led and mentored 10 IT personnel by providing guidance, knowledge, encouragement, and corrective action for personal development and mission success.
  • Implemented data network security measures and performed information system security incident handling when required.
May 2013 - Dec 2013

Integrated Network Support Tier Ii Technician

Washington, DC, US

  • Installed, operated, maintained, and provisioned the internet point of premise (PoP) systems and supporting architecture, including routers, switches, firewalls, and intrusion prevention systems.
  • Monitored logs for system degradation, intrusion, vulnerabilities, and malicious activities.
  • Maintained backups, configuration management, and documentation for network architecture.
  • Managed Wide Area Network (WAN) links and site-to-site connectivity, implementing firewall, routing, and access control lists (ACL) modifications as new devices and systems were added at various sites.
Nov 2011 - Apr 2013

Communications Systems Operator

Washington, DC, US

  • Delivered strong, reliable communications support directly to the President of the United States.
  • Provided Executive Lift communications support to the Vice President, Heads of State, Executive Branch Cabinet Members, and Joint Chiefs of Staff. Trained White House Military Office (WHMO) personnel and Secret Service.
  • Established, operated, and maintained communication capabilities on multiple radio frequency networks and other government data networks.
  • Assisted squadron members with e-mail, printing, mobile device, and workstation support required to conduct Presidential support missions.
Mar 2010 - Nov 2011

Network Administrator

Washington, DC, US

  • Provided technical assistance to more than 6,000 personnel in the areas of software and hardware support, permissions management, printing, and mobile devices.
  • Administered and monitored servers and networks for performance degradation, performed backups, and ensured domain and e-mail services remained available to all personnel.
  • Monitored external network connectivity and coordinated restoration when outages occurred.
Mar 2008 - Mar 2010
2 education records

Scott L. education

Master Of Science - Ms, Cybersecurity And Information Assurance

Western Governors University

Bachelor Of Science (B.S.), Computer Networks And Cybersecurity

University Of Maryland Global Campus
FAQ

Frequently asked questions about Scott L.

Quick answers generated from the profile data available on this page.

What company does Scott L. work for?

Scott L. works for Boeing Intelligence & Analytics.

What is Scott L.'s role at Boeing Intelligence & Analytics?

Scott L. is listed as Cybersecurity Professional | CISSP at Boeing Intelligence & Analytics.

What is Scott L.'s email address?

AeroLeads has found 1 work email signal at @lpl.com for Scott L. at Boeing Intelligence & Analytics.

Where is Scott L. based?

Scott L. is based in Huntsville, Alabama, United States while working with Boeing Intelligence & Analytics.

What companies has Scott L. worked for?

Scott L. has worked for Boeing Intelligence & Analytics, Babylon, Lpl Financial, Yoh, A Day & Zimmermann Company, and United States Marine Corps.

How can I contact Scott L.?

You can use AeroLeads to view verified contact signals for Scott L. at Boeing Intelligence & Analytics, including work email, phone, and LinkedIn data when available.

What schools did Scott L. attend?

Scott L. holds Master Of Science - Ms, Cybersecurity And Information Assurance from Western Governors University.

What skills is Scott L. known for?

Scott L. is listed with skills including Information Assurance, Security, Network Security, Security+, Network Administration, Information Security, National Security, and Troubleshooting.

Find 750M verified contacts

Search by job title, company, industry, location, and seniority. Export verified B2B contact data when you need it.