 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ' Y6 S( L9 H: G! _- `! L' W3 o
Job Title: IT - Security Architect
0 a. E$ |* i/ l& B3 Q5 pPosted Date: 10/22/2009
' m* x$ y# i1 ?" x0 E: Y. W6 pDepartment: IT-Admin . i1 A" V6 K9 D" [6 D" p( i3 S; m) b! Y
Closing Date: 11/05/2009
, p4 t( T6 Q6 N/ A1 {Location: Calgary
- b5 R! J- j+ u4 LFull/Part Time: Full-Time
! a V5 t8 ]8 ^- \# V, yRegular/Temporary: Regular S. j5 K& k* R4 h9 m
6 c2 B8 t: m) Z2 e( D$ O# E" M' T
Job Duties / Responsibilities1 N) T- e" S. f9 p8 t$ b
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
& ?9 Y- N0 e* N• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ! ]( P/ V" f9 b C% E/ j
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 2 l2 j6 _5 w( R: T- x
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; , Q, S- ~! x. t/ I. d, ?
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; + W% c% I& K5 ` ?
• Share best practice opportunities and provide an industry experience perspective; Y6 w# X! C M3 ]
• Support and participate in SOX 404 compliance and Audit review activities.. G9 w4 \! \; R9 h& Y" }
# ]( N2 ]- h% F! D4 q6 ~
, a( d+ q1 v8 e' ^! sEducation / Experience( _- ^2 v! y# p" A
• University degree in the field of computer science or other appropriate discipline;
4 z; c X$ n6 O+ r4 [5 K• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
' g: Z6 C$ K q• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
9 E) }& `5 z2 i2 |4 w; s- h: I• Excellent verbal & written business and technical communication skills;
4 w& G+ k0 K* b5 t• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
. Y0 e" \# t6 Y1 c! I! f2 {% `( }' r
The following experience would be considered a strong asset:
1 x2 c' n- r3 N8 `" `, C" i• Multi-tier computing architectures and middleware technologies; 9 N1 |( _2 f& q
• Web-based and 3rd party access authentication mechanisms;
/ x( [- }4 ]+ U+ ?; ]- j W• Demonstrated technical and security solution leadership; 9 C2 m1 ^9 d4 R
9 K1 o% `3 _9 T4 u4 C1 j
Education Accreditation, Certificates and Licenses:
: S% Z: a: m/ G( m3 v/ L• Possess or be working towards a CISM, CISSP or CCSP certification. |
|