 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
8 I7 x g: t! ]) e: V: R+ MJob Title: IT - Security Architect 3 X# ]+ D1 O- z
Posted Date: 10/22/2009
% V' g2 e% z# G. XDepartment: IT-Admin
$ N d. u/ H1 G# ^5 G) o1 ~' RClosing Date: 11/05/2009 ( @ {% n7 H! ~! }# d. O
Location: Calgary . w5 @2 @+ w& A$ _1 D9 }
Full/Part Time: Full-Time
0 u) L# R6 p; w2 [. f2 E2 C+ ZRegular/Temporary: Regular 4 o# ^/ W- ]$ e" s6 J) V' {1 g2 I! F
- E9 p% q: e& V0 tJob Duties / Responsibilities7 B: w$ E% z% ~
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
7 g2 P8 n( W w' E3 c! O• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
/ _+ z* l& y/ [6 P' m# K• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
, t$ m' a+ {" z; p• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
& c- R9 M0 q# q• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
% L2 i5 P; T2 w& \8 d% |• Share best practice opportunities and provide an industry experience perspective; % y/ {: n+ g* @3 O) r
• Support and participate in SOX 404 compliance and Audit review activities.
0 L" O( I6 Y2 d6 r; U$ D) }- d. C$ y9 l/ J3 q; H J; `1 j' c3 y) c5 t
& [0 A* x8 f3 J* V7 [Education / Experience! O2 ?" m) @) `& G
• University degree in the field of computer science or other appropriate discipline; ( J$ B, H% m$ Q: B2 e
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ! D3 `1 f0 ^+ A
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
6 Y) X c1 i# J$ ?' Y• Excellent verbal & written business and technical communication skills;
2 K5 {* S$ F; ~$ O* e6 w• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
2 S" i! T! b; n1 O3 l. _( t* J& [& Q6 O
The following experience would be considered a strong asset: & H% A" M) k8 {/ G @6 c( |
• Multi-tier computing architectures and middleware technologies;
, A/ T' F. S2 l" c; r3 r• Web-based and 3rd party access authentication mechanisms; - [$ J$ q. R# y( u/ L
• Demonstrated technical and security solution leadership; " z8 P5 ?; i& l
9 {3 d0 o3 Q0 k6 Y( j" p/ u
Education Accreditation, Certificates and Licenses: / s0 k4 Q3 K5 d
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|