Stephen Vames
Details
Second Circuit Court of Appeals
Information Security Officer
Established, managed, and maintained information security standards, policies, and procedures in compliance with information security and risk management standards and guidelines (administrative, technical and physical). Protect confidentiality, integrity and availability of data systems, IT systems and networks. Function as internal consulting resource on information security issues while conducting information security risk assessment program. Review compliance with information security policy and associated procedures.
2012 : 2018
The LeFrak Organization
Information Security Officer
Supervised and managed IT personnel. Monitored, managed and maintained all aspects of security to include : antivirus, spam filtering, PCI compliance, business continuity planning, system fault tolerance, video surveillance, remote access and datacenter physical security.
2005 : 2011
Future Tech Enterprise, Inc
Director of Technology
Developed and managed a Consulting Services team of 25 presales and post sales individuals. Duties included business planning, presales process and development, network design, end-point protection, cyber-attack remediation and mitigation as well as network security topology reviews.
1998 : 2005
Manchester Technologies, Inc.
Director of Professional Services
About
Information Security Executive
Leveraging Network Management background to design and manage IT security services.
Skilled at security policy management including development and validation. Lead security implementation and management projects, scoping, and tracking to project completion. Highly focused, detail oriented with excellent analytical and critical thinking skills.
Track record of providing a broad-range of security services across multiple areas. Risk based analyst exceptional at Violation Tracking & Management, Patch Management and Security Compliance Checking.
Vulnerability Management | Security Policy Creation and Management | Patch Management
Risk Management | Compliance Management | Change Management | Network Security | SDLC