 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
( a; E& a. I: wJob Title: IT - Security Architect
- E' @9 m+ K! u9 {# MPosted Date: 10/22/2009
6 b: G8 z" j T2 v0 N' A0 SDepartment: IT-Admin , ?5 D# T3 d. d( }& ]" J
Closing Date: 11/05/2009
# z; t3 Q3 c& U( u1 o& eLocation: Calgary 1 C! t2 B9 O/ c$ L
Full/Part Time: Full-Time
# s' \8 a& c1 ]- c# U% mRegular/Temporary: Regular
! Y0 O4 v6 R$ B/ _6 S; d1 ?0 m8 m$ g3 z
Job Duties / Responsibilities v/ H' p; I+ ^& [. r% @
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
2 R2 | }$ e6 F• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ; n" d- w! B) O: b2 V: w% g
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
l( h9 h# H; p3 { Y) J• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; " w5 _. p2 x7 K8 q
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; C/ q; |8 t& p @; Z
• Share best practice opportunities and provide an industry experience perspective; ' _& q' X7 w" S# A# E5 r
• Support and participate in SOX 404 compliance and Audit review activities.5 N* o! p6 F! N
- f3 L4 O" V4 P8 X9 k8 m
. E" c2 E- y _( k7 F% ^# v
Education / Experience9 N+ \ |2 p2 q; J% F2 V
• University degree in the field of computer science or other appropriate discipline;
+ K5 _4 x8 f2 o2 w# r• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
! w- l7 L( ^! U- {0 F• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
% I6 `- @) \! o7 p- F• Excellent verbal & written business and technical communication skills; ! @4 H0 v7 k8 a
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
. d \7 K3 |. |7 Q3 j5 b! D1 P0 l# a
The following experience would be considered a strong asset: 9 V4 w$ n/ l& t3 I
• Multi-tier computing architectures and middleware technologies;
5 y& l c+ C3 [• Web-based and 3rd party access authentication mechanisms; 3 N$ u' C7 P. @& n3 D
• Demonstrated technical and security solution leadership;
0 m' {6 F! w: r$ }+ W' o, V4 d& |
Education Accreditation, Certificates and Licenses: 1 o! I5 P- }0 y+ n4 L3 p
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|