 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
/ y6 `3 i' l( L( R/ A* y6 hJob Title: IT - Security Architect
/ ~2 j; W+ a4 g" \' B* C3 D5 KPosted Date: 10/22/2009
$ I) A" d/ k: t- hDepartment: IT-Admin
1 o' G. N% ]* t: VClosing Date: 11/05/2009 1 e7 B$ U8 R t3 E2 [9 h: p* f
Location: Calgary 3 H1 d& S0 D/ I5 l$ l
Full/Part Time: Full-Time , H& g" Y; j( L" p9 D0 r
Regular/Temporary: Regular
8 B/ }0 u' t9 L" b4 n" I% c7 a* C3 R9 j
Job Duties / Responsibilities
/ J# ?, P6 \ j6 m5 W, Z5 ] A• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 I O5 |- ]/ U- b* R4 {5 Z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
! q1 u" H. R* T• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
/ k9 U3 y5 e, Z( B2 L2 L• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 j9 v6 _$ M4 K• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ }: `, u" i8 a% B• Share best practice opportunities and provide an industry experience perspective;
+ W5 c k; K: v2 F* t$ q• Support and participate in SOX 404 compliance and Audit review activities.8 h( w! r$ K. J; }
, M( L; Z3 x1 o0 u+ {. {2 _1 R9 \& L2 y1 g
Education / Experience" @, F7 _: ]6 M3 Z* ~' G% j
• University degree in the field of computer science or other appropriate discipline; ( Q# U) G: D! u& K1 o! j% M
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
2 ]# M7 M% X! f; L0 G1 O" ~+ ?• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
% A) a. u- T+ n9 I% b! k• Excellent verbal & written business and technical communication skills; , B9 u4 v( F4 D6 c
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. F- A9 E) E+ z8 L! |2 m
3 S/ G! p, K# @. ~1 zThe following experience would be considered a strong asset:
" f' k- A$ d: V" m, C& q1 A7 U• Multi-tier computing architectures and middleware technologies; + @! M; S8 k+ ?# [9 g" a: O
• Web-based and 3rd party access authentication mechanisms; + a+ S) i, }) e1 o4 O; z9 n
• Demonstrated technical and security solution leadership; % `7 ]" S6 y+ l; i
) d4 ~8 {3 E+ u& A+ ?9 c2 U HEducation Accreditation, Certificates and Licenses: ) {! _/ \6 r) `- ~: a; D
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|