 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
( @) H/ j9 Q, o, ~; w8 l0 UJob Title: IT - Security Architect 1 ^, I7 U- u$ ?6 S5 n3 f
Posted Date: 10/22/2009
, ^* e+ z- z: y5 Z ^. }2 pDepartment: IT-Admin
4 r' o& k8 E* `* r' E( c, lClosing Date: 11/05/2009 1 n& B" `4 Y6 w6 o
Location: Calgary 1 A: h( c/ ]& l& r/ u7 a% c
Full/Part Time: Full-Time
( A! _: o! }( J) z+ l3 a qRegular/Temporary: Regular
2 N0 h) p- l; q$ V3 G+ e' F
% O* I" \$ ?0 o2 z; tJob Duties / Responsibilities
! h& o& p0 D4 L9 L: U: _• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
, w0 ^# t- Y$ n• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ! [; |4 K6 ]8 K) r3 y
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
! B2 e M/ e# i1 S5 ]$ M5 f8 a• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; + h/ e6 C5 h( v( ?
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
" C& @( L( o+ o* n# X; Y1 r" u* v7 S• Share best practice opportunities and provide an industry experience perspective; + G6 {$ x5 h4 v: K# j5 M7 t
• Support and participate in SOX 404 compliance and Audit review activities./ i1 A& D0 ^8 k/ Q
: h" l5 j# b! l) U, S
: K. q7 p. ^. d [* u) \0 ?9 t0 QEducation / Experience
" P/ J+ X' q8 T; D/ T8 S' I• University degree in the field of computer science or other appropriate discipline; . K! C5 X# s/ H3 N3 e/ Q- ^
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ! p2 n( g6 @2 f7 g8 L6 i
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
3 D! g) Y. H0 D+ c• Excellent verbal & written business and technical communication skills; 4 e8 j; z: _/ k5 R# B+ U
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 7 N9 N! Q" U: z/ E! y
/ I) k* n5 {; h$ h" S1 ]% c- y3 r
The following experience would be considered a strong asset:
2 F) R# Z# n- h/ s' M• Multi-tier computing architectures and middleware technologies;
( g8 L0 D3 D& o8 f8 A• Web-based and 3rd party access authentication mechanisms;
; ]/ ]5 d- R: [4 L9 ]2 Z9 T/ q• Demonstrated technical and security solution leadership;
3 O# S1 S7 U0 ~
# `2 {* u; Q- ]5 y6 l* {# {7 HEducation Accreditation, Certificates and Licenses: ! M! A2 P: y3 l1 }2 B4 W
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|