 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting * N4 E1 ~! N5 S1 W) z
Job Title: IT - Security Architect
7 F# X- K1 ?5 _2 \4 Z- FPosted Date: 10/22/2009 4 _$ t% ]- i9 K8 B! d# V
Department: IT-Admin # ?$ H- s0 x" R! j
Closing Date: 11/05/2009
/ ?* a: o* r1 M+ ^3 [Location: Calgary
7 t1 ]7 M }6 L/ B& ]! ^9 uFull/Part Time: Full-Time ; }; _! n/ \" I5 _, P
Regular/Temporary: Regular - \% U6 E4 U# M; V2 O: S+ B
, Y3 J" [. t; l2 L1 SJob Duties / Responsibilities
- r5 }3 L! l& q" w- S• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
& y8 X: j6 T0 V* B7 _• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
+ ~' S M5 M. N9 X# n• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
( Y, p* w: K. R" g% E2 p: d• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
; N A/ R: V3 a" I& i6 ^+ O• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ( O4 s+ m3 Z- F
• Share best practice opportunities and provide an industry experience perspective; 1 }6 ?4 V3 J# _) q( p& f. d
• Support and participate in SOX 404 compliance and Audit review activities.
" ~' A. p; e* S4 F% L: h
. |! J; u' ~3 f/ E- u, X/ f+ _& q0 G$ I5 N8 N2 t0 `; ^7 }
Education / Experience
3 |* m8 M4 C+ _9 f1 p! t1 A% {• University degree in the field of computer science or other appropriate discipline;
- J6 x/ v% V$ g3 q9 k2 y• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
1 T1 @+ ]* B, j5 Z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 ]# p" j/ X6 b/ |0 h3 c. `• Excellent verbal & written business and technical communication skills; 9 |; H7 U7 s! i1 ]1 U- N" _
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
0 W& u( q7 e4 m( B7 z9 [2 X, |0 _/ c0 e4 x/ I! Y
The following experience would be considered a strong asset: 3 ?$ N5 ^2 U: W! Q
• Multi-tier computing architectures and middleware technologies;
5 }' |* p t3 J- e0 K$ ]8 x• Web-based and 3rd party access authentication mechanisms;
4 |1 e; Q! v! ~" y! l* }; ?3 F• Demonstrated technical and security solution leadership;
1 f h& @0 {8 O2 q5 D/ x; j% T4 Y' }6 a
Education Accreditation, Certificates and Licenses:
/ C6 U, e1 s3 B# M, T2 C• Possess or be working towards a CISM, CISSP or CCSP certification. |
|