 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
5 Y6 N, I) ?+ TJob Title: IT - Security Architect
: ?( W- ?1 Q0 Q# _& n* u" X/ cPosted Date: 10/22/2009
5 N( U) L# Z8 ~% a& Q8 Q! ?Department: IT-Admin 8 B) S+ p+ p$ Y* [
Closing Date: 11/05/2009
$ j1 f% `: k8 R0 ~6 cLocation: Calgary 9 F3 L- g$ ?" P
Full/Part Time: Full-Time # r/ e. m: `8 p0 d
Regular/Temporary: Regular
4 B! Y9 e: H, U* x* j+ q9 _( U8 U5 e
Job Duties / Responsibilities
8 ]; u, F) f+ k; g• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
# ]! D, P5 ^, z• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; " L. O& g* d5 y; w" N
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
3 @* d, y$ F5 C5 c4 R& t; y• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
% M/ k& a& a5 V% X# P+ S# w& N p$ n• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
' ]8 P9 o# u# I5 h+ F( g5 D5 z• Share best practice opportunities and provide an industry experience perspective;
8 l/ ?2 E N( k3 V' T6 h* E• Support and participate in SOX 404 compliance and Audit review activities." H" W$ N( p, q$ u1 @' \
; `9 ?# h% [8 K( ]( m: T x
; u( _# _! C; |Education / Experience' V3 f8 a9 h5 u# b. Y
• University degree in the field of computer science or other appropriate discipline;
5 S- j$ @7 | {' y6 L• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
! V9 x# }! ^$ l# e/ I• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
5 i* h9 ~& T1 U9 \, k7 g7 K; M• Excellent verbal & written business and technical communication skills; q* w5 p9 g7 t2 t/ d; F& k
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. U, s+ U. Q. W; c- Q1 W( T0 c( d
: U! d8 H+ q3 |- Y0 w6 g, v
The following experience would be considered a strong asset: 3 i7 Y& O/ z3 g* H2 u3 f* e
• Multi-tier computing architectures and middleware technologies;
) c% J: W# ~! Q9 v8 v• Web-based and 3rd party access authentication mechanisms; ! }2 r* C1 ~# n1 G8 ~+ C& \
• Demonstrated technical and security solution leadership;
: K+ @: u3 ]4 q
# z" O# G+ Y3 }$ H8 Y/ l( G9 JEducation Accreditation, Certificates and Licenses: 0 Y$ ^5 [8 Y! A( W4 M2 j* d8 V7 M. T& S
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|