 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 7 G- ~$ c9 E K# S
Job Title: IT - Security Architect + _, @/ b* c; L* e3 p
Posted Date: 10/22/2009 5 e% ]& }6 L$ I6 ^: K8 ]
Department: IT-Admin
/ _- x/ H4 j0 m6 \) h( `: TClosing Date: 11/05/2009
, }8 ~$ O# S3 S8 sLocation: Calgary : Q. Z& S6 ^. P8 Q
Full/Part Time: Full-Time : m* y. c$ l' e$ V; j
Regular/Temporary: Regular . [3 @* k: X0 ^" a
' ^& \8 X. X( E' g* _! ?
Job Duties / Responsibilities* E2 C5 x5 A& I. ?
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
( a. z. p9 ~$ o9 x" i9 M/ U& s1 |• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 5 d( j# I2 [2 r
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 7 J" u8 R; u$ j V6 x
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
! J7 T: y% P* w• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ) e6 P4 L5 G0 x: G X
• Share best practice opportunities and provide an industry experience perspective;
7 I# A3 T3 ?$ Z. I• Support and participate in SOX 404 compliance and Audit review activities.
1 D* }5 X4 u5 } b7 d
5 D7 q ~, j4 O" D k6 S6 w+ x" {6 V* H3 y5 w7 _9 P
Education / Experience* C! h( I! B: A4 t
• University degree in the field of computer science or other appropriate discipline;
G- Z, Y0 f% t' b' C• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
; d- `. D! X8 I3 b+ i• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
9 g$ |/ G8 ]7 y0 Y# K• Excellent verbal & written business and technical communication skills; $ v7 i1 @; }6 @! T, `
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
3 y, J$ J" ?* s$ ^0 I3 D. A- S/ u0 i" c/ X g% P. m" I( N
The following experience would be considered a strong asset:
1 X/ i1 w/ |9 T3 u; D0 u% u) C• Multi-tier computing architectures and middleware technologies;
& W3 u; E$ F4 J. `: H1 J9 P+ I• Web-based and 3rd party access authentication mechanisms;
3 c% _$ c% y6 B• Demonstrated technical and security solution leadership; ( q! V. Y6 {2 e m/ b! {- @
' h& a+ ?% A$ x7 [! t, z! w
Education Accreditation, Certificates and Licenses: * O; D+ E) P# Q. ]! q B
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|