 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 Q; j# L! N+ J; \/ K0 EJob Title: IT - Security Architect 1 c+ A* Y( p" k* T
Posted Date: 10/22/2009 8 g8 E# u2 f" `) W
Department: IT-Admin
- R9 n: n4 F# L# W/ V! t, TClosing Date: 11/05/2009 _" Y" N2 q; m) P6 H5 x
Location: Calgary ; i# r; t' P$ Q( f
Full/Part Time: Full-Time
( ~. q) a( N" M; ~8 l4 KRegular/Temporary: Regular
9 ]2 y3 m! s) s, U+ [
1 N7 Z* o' N; j; uJob Duties / Responsibilities) F" H- m2 R% a7 z2 l+ {# L
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
- q, D( J! i! c" k• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 8 w' x8 o+ y u& }) `- i/ v
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
. E! |5 S2 e4 @( T! M) [3 i• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
@8 Y7 j/ s& }/ X• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
5 g: F+ X8 Y9 k3 H• Share best practice opportunities and provide an industry experience perspective;
( |: x# U0 D1 n7 ^• Support and participate in SOX 404 compliance and Audit review activities.9 \$ K3 ^+ Q. D2 x6 b( y, b0 c
s$ K; p/ d2 _* \5 O8 R
: x- V- i* A8 [5 qEducation / Experience. v- G5 w9 x" D9 a( n- w# T4 U
• University degree in the field of computer science or other appropriate discipline; ' g; E6 o& c% L" y" {+ Q
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
3 B% K1 K$ |3 C6 k+ @) L• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 9 {* F/ u* A: t D' p! _
• Excellent verbal & written business and technical communication skills; ; a5 I0 |, N3 @" I! J, {
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 5 R! Z# C( ? F: P
- h, a A; \5 k) x) t( AThe following experience would be considered a strong asset:
v9 W- x3 Q4 E& p• Multi-tier computing architectures and middleware technologies; w4 |' A) J& Z+ ]
• Web-based and 3rd party access authentication mechanisms;
) y5 i& Y3 S4 D3 o• Demonstrated technical and security solution leadership;
! M( m$ i3 t7 j1 H
- T7 H1 R$ H; REducation Accreditation, Certificates and Licenses:
. i' g2 O# U5 A; x' L) ]• Possess or be working towards a CISM, CISSP or CCSP certification. |
|