 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 s4 [* @2 z7 T/ D( { w9 yJob Title: IT - Security Architect 3 t. V; z! r/ o, x: ?6 Z% I. h
Posted Date: 10/22/2009 , v8 D, V! \' T5 p% W8 ^# M
Department: IT-Admin
: ~# k- v: B7 ?& d, ~Closing Date: 11/05/2009 ! ~+ }& x# l7 I* I) X
Location: Calgary
" c. v+ Q) H, Y. \) x1 [& D! _+ O2 QFull/Part Time: Full-Time # b. _! X9 Y& I
Regular/Temporary: Regular
" Q: z1 J; X/ {/ H+ I: h0 q& y& L! ^6 o
Job Duties / Responsibilities: V3 S9 U( r$ W& c! x: v
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; / [: y% K3 x2 |+ ~1 N
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ( b) Z# {8 m* R+ p0 _- {! V
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; - K( U/ Y5 e% J' y& K
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ) o5 } k9 o% D! ^2 [4 N
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
* X1 O: k+ a# d* o) x. Q0 s• Share best practice opportunities and provide an industry experience perspective; - k+ k. G+ X% Y0 z8 D$ E
• Support and participate in SOX 404 compliance and Audit review activities.
' s7 `7 h) c. N8 h- A$ C
# C5 L. C, S' |6 H9 e! ]% p
1 z( k3 D; Y0 p% J7 UEducation / Experience
6 D0 T% A" o$ `2 {• University degree in the field of computer science or other appropriate discipline; ' e9 g% F5 F5 x" t6 Q9 _
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; $ C: `; d. m" l) R, i7 v
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ) _3 U1 W5 A. B; N9 c7 o
• Excellent verbal & written business and technical communication skills;
8 S9 W: h+ {1 t4 _. ~• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
9 ]# `5 ]8 K2 R, ]- o) y _4 c3 {
The following experience would be considered a strong asset: 4 g/ \: l- D; {+ U9 B. Y
• Multi-tier computing architectures and middleware technologies; ; X$ X" [( O2 y$ Q) [9 V; A& A2 H
• Web-based and 3rd party access authentication mechanisms;
6 F: _3 S" S* L- P; ]9 h• Demonstrated technical and security solution leadership;
. [/ u! O/ t: `6 N3 M
0 |- j& ?. G5 K* TEducation Accreditation, Certificates and Licenses:
% f) P' K$ h' J& E• Possess or be working towards a CISM, CISSP or CCSP certification. |
|