 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
' G7 u& d$ o# @/ \ C/ D+ @. EJob Title: IT - Security Architect + `& x0 {/ O/ P/ E/ [& p
Posted Date: 10/22/2009
/ X e4 W) g. Y# wDepartment: IT-Admin
/ O9 r3 }! D" Y7 K+ J0 xClosing Date: 11/05/2009 5 d. D3 G! r: w; ~& f( I
Location: Calgary 3 c; h" l5 M+ b! O# M, _0 r8 k
Full/Part Time: Full-Time
/ S. G8 L% f U. YRegular/Temporary: Regular
& m. S+ B' r. o- ?1 b d5 q% U, I
2 V1 p2 w6 O: V* f) ]Job Duties / Responsibilities/ @" V: j2 S. k: r4 z8 t$ N
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ' G. b9 b, e1 W! [$ ?
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; $ l$ ]3 s0 y8 K$ x% l; i
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
& S# n" j+ N% L4 P ]$ p6 g$ q+ p+ }• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
$ p" ]6 ^, @& g2 F• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
( }1 p4 w" B2 |/ d• Share best practice opportunities and provide an industry experience perspective; 6 c' t+ }0 m) y2 R2 W
• Support and participate in SOX 404 compliance and Audit review activities.' X, ]9 y: g$ g' ?' a2 D+ ]
; ^/ w* {( P5 r+ z4 f" I+ ?4 D# L; G# Q1 l) J
Education / Experience
/ m' a8 r3 v. `3 r. M• University degree in the field of computer science or other appropriate discipline; & V1 z& z* K6 [. q3 Q4 ?/ G
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; , g' V5 e, U6 }5 b: |7 I
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
" m# d. N6 P. d0 n- P• Excellent verbal & written business and technical communication skills;
- P7 I) e, j2 w, q, A1 d• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
" C: p" q) k; c5 m9 H$ Y0 O5 z
3 i9 d' F+ p* c1 e% y/ R: L& lThe following experience would be considered a strong asset: / M* q, Z9 n# `( v8 \
• Multi-tier computing architectures and middleware technologies; M% M: x( ?$ R
• Web-based and 3rd party access authentication mechanisms;
) m* a% ~4 V9 p2 K% W* G; S+ F• Demonstrated technical and security solution leadership; 9 p: j3 |3 J' L4 \/ u9 I7 ?" s
) w5 R2 E0 p5 k+ ~( k
Education Accreditation, Certificates and Licenses:
+ T, b( |$ \, m) R/ c• Possess or be working towards a CISM, CISSP or CCSP certification. |
|