
Stephen Weimer
Responsible for leading and assisting in cyber assessments on internal affiliates and third-parties based on the BNYM Cybersecurity... | Edison, Edison, United States
*50 free lookup(s) per month.
No credit card required.
Stephen Weimer’s Emails sw****@ea****.com
Stephen Weimer’s Phone Numbers No phone number available.
Social Media
Stephen Weimer’s Location Edison, Edison, United States
Stephen Weimer’s Expertise Responsible for leading and assisting in cyber assessments on internal affiliates and third-parties based on the BNYM Cybersecurity Services Model (CSM). Assessments measure compliance with the CSM and identify and quantify any gaps. Responsible for meeting and interacting with the entities being assessed, conducting the assessments, producing and reviewing assessment artifacts, reviewing remediation plans, and tracking the lifecycle of gaps through closure. Work across all lines of business within the organization, with exposure to a wide breath of technologies as they are integrated within the organizations via 3rd party vendors and affiliates. Partnered with groups and affiliates throughout the organization to provide meaningful risk assessment for new technologies as they are integrated within the bank. Executed and supported cyber security risk assessments on BNYM affiliates or third-parties • Validated effectiveness of current controls and identify potential gaps • Reviewed assessment results for vulnerabilities, gaps, and control deficiencies and worked with business stakeholders to establish plans for sustainable resolution • Documented results of assessments and verification activities • Performed engineering review of security control modification proposals and determine the effectiveness of the proposals while determining their ability to meet BNYM standards • Partnered with BNY Mellon business units and affiliates to create technical solutions based on risk assessments • Speak and understand terminology, especially those related to cybersecurity assurance • Produced and maintained metrics based on the assessment framework • Determined potential impact of detected gaps and translated that into risk within the established framework • Developed situational awareness and stay informed of current technology and vulnerabilities • Perform any tasks to ensure that the Cyber Assessment Team meets its commitments. Secure computer resources from unauthorized access by ensuring that Information Security policies and procedures are properly implemented. Ensure daily security issues are responded to as defined by IT policies and procedures. Maintain systems to protect data from unauthorized users. Identify, report and resolve security violations. Enforce compliance with security policies and procedures. Ensure network security access and protect against unauthorized access, modification or destruction. Review security logs generated by company implemented security systems. Review and analyze security alerts and vulnerabilities from vendors and other security sources. Work with other information security staff to ensure that daily security issues are responded to as defined by IT policies and procedures. Administer Websense web filtering software to monitor and block access to unwanted internet content. Administer Symantec antivirus software to prevent viruses, worms and Trojan horse infections. Administer LanDesk software to ensure compliance to established standards. Initiate Nessus scans to find system vulnerabilities and address mitigation through reports. Add, remove, and audit PROX card access. Utilize Airwatch MDM reporting to ensure remote system compliance. Conduct Knowbe4 phishing campaign reporting.Create policies and procedures that improve organizational and business unit performance as well as ensure security and data integrity for all systems. Assess and validate infrastructure and systems security through operational audit reviews and process testing to ensure the optimal performance of the network. Review application and system productivity requirements by consulting with staff and clients; evaluating procedures and processes. Troubleshoot and resolve all computer-related problems while ensuring the computing environment, including all hardware, and software, is in good operating condition. Perform installation of new equipment, including testing of new units, insertion of chips/boards and cable hook ups, and configuration of hardware to meet all business standards. Develop solutions to address organizational operational needs by identifying technical issues in the operating environment. Development technical manuals, action guides and continuous training support to the organization. Provide continuous process improvements and business initiatives of the department that aligned with company goals. Ensure system and equipment maintenance is being regularly scheduled. Correct all system failures according to SLA. Keep current regarding new technologies by participating in educational opportunities and reading professional publications. Protect designated computer programs, databases, and data files from unauthorized or accidental duplication, modification or destruction. Coordinate the purchasing of computer software and hardware to organizational specifications. Employ software, hardware, and reporting tools and resources to achieve all customer satisfaction goals. Work closely with management to prioritize business goals and technology needs including preparing departmental status report and project development as required. Liaison with external consultants and business partners. Install new / rebuild existing servers and cloud infrastructure and configure hardware, peripherals, services, settings, directories, storage, etc. in accordance with standards and project/operational requirements. Perform daily system monitoring, verifying the integrity and availability of all hardware, server resources, systems and key processes, reviewing system and application logs, and verifying completion of scheduled jobs such as backups. Provide Tier III/other support per request. Investigate and troubleshoot issues. Repair and recover from hardware or software failures. Apply OS patches and upgrades on a regular basis, and upgrade administrative tools and utilities. Configure / add new services as necessary. Perform ongoing performance tuning, hardware upgrades, and resource optimization as required. Configure CPU, memory, and disk partitions as required.
Stephen Weimer’s Current Industry BNY Mellon
Stephen
Weimer’s Prior Industry
Innovative Document Imaging
|
Easter Seals Inc.
|
Foresters Financial
|
BNY Mellon
Not the Stephen Weimer you were looking for?
Find accurate emails & phone numbers for over 700M professionals.
Work Experience

BNY Mellon
Vice President - Specialist, Information Security Analyst Technical Cyber Risk Assessment
Tue Jan 01 2019 00:00:00 GMT+0000 (Coordinated Universal Time) — Present
Foresters Financial
Information System Security Specialist
Thu Jun 01 2017 00:00:00 GMT+0000 (Coordinated Universal Time) — Tue Jan 01 2019 00:00:00 GMT+0000 (Coordinated Universal Time)
Easter Seals Inc.
Technical Support Analyst
Mon Sep 01 2014 00:00:00 GMT+0000 (Coordinated Universal Time) — Thu Jun 01 2017 00:00:00 GMT+0000 (Coordinated Universal Time)
Innovative Document Imaging
System Administrator
Tue May 01 2012 00:00:00 GMT+0000 (Coordinated Universal Time) — Fri Aug 01 2014 00:00:00 GMT+0000 (Coordinated Universal Time)