 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
7 X7 ~- N/ V K1 S. pJob Title: IT - Security Architect
- y$ [2 v- C' `8 J5 Q7 i) {Posted Date: 10/22/2009
9 }& ]" z! L; R4 j! I) m( N: yDepartment: IT-Admin ; ?& ?8 E# F1 I$ l" x5 D! h$ u
Closing Date: 11/05/2009
2 [# k' n! t* g3 Y7 j, _' ]8 P3 qLocation: Calgary v) M& G- v& T |" D
Full/Part Time: Full-Time
0 Z3 K- B4 M# L6 T9 ]7 aRegular/Temporary: Regular . S( }) o/ n8 d& L
; k! }9 P( r, B/ g6 {Job Duties / Responsibilities
% ~0 V7 S3 b7 l% ~• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 4 g, A6 t7 V$ @) A
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
* o1 I( S6 f& \; W% u. V• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 8 V; W" W% m3 _! h' X$ @
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
# z+ {3 ~% d, Z* J+ }• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # w# f7 I3 k0 }! ]
• Share best practice opportunities and provide an industry experience perspective; ' N6 K8 D9 K0 i% a- |6 B4 [
• Support and participate in SOX 404 compliance and Audit review activities.- p& R C6 h& S# e5 U/ ^$ u5 A
4 ?- L+ _* s4 A! c$ z r6 }! `* n. d1 o
2 S: s+ s7 ?8 {2 \Education / Experience+ X* n% H( ~5 C+ v
• University degree in the field of computer science or other appropriate discipline;
! n7 k, V) x J+ w* }7 |) @• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 4 g m6 L& I3 X, U
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
4 ^2 |2 ]0 A# h1 [* a. p( |7 W' w• Excellent verbal & written business and technical communication skills; / f9 b( z+ k5 Z
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. + i2 X: @+ V/ l1 K
8 h3 \& T! f8 K H6 d
The following experience would be considered a strong asset:
9 z2 n' ]; t& A, o, y k• Multi-tier computing architectures and middleware technologies;
# z$ k& |) ^" _1 Q3 T$ o• Web-based and 3rd party access authentication mechanisms;
' ^. o6 Z' E! w% n3 ]; q• Demonstrated technical and security solution leadership; + O( C0 @# I9 A D
8 k0 Z# W. y/ |1 N$ ?Education Accreditation, Certificates and Licenses: ( ~, w4 P( ~& B
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|