 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 1 }% C+ t: d) J' e
Job Title: IT - Security Architect " P7 A$ N* `+ G5 T. m; k- |
Posted Date: 10/22/2009 ' L/ v$ o. J/ g5 _
Department: IT-Admin 8 ^/ P& U; O* G+ D' e% N/ E' E
Closing Date: 11/05/2009
1 l1 b4 v1 i5 m3 H) U( s; D# `Location: Calgary " `4 @- T3 J& T* \9 ~8 }" i
Full/Part Time: Full-Time
) N/ r. s" B: d$ hRegular/Temporary: Regular " c/ ^% l2 N# C `! ^: k4 T
S2 D3 @ H8 z' L; f; x0 D
Job Duties / Responsibilities& y6 t2 K) |$ U8 M& s/ P0 W
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
4 e( z2 Y& h, z* O& g1 |• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
8 P# q3 J& T, g$ h- g• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
% n0 w w2 w9 ]. p+ h• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 8 f3 w2 G. r8 C5 x% x |/ a( K
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; + s6 d% V1 N* ?
• Share best practice opportunities and provide an industry experience perspective;
( L# k& k4 \ a4 p) ]• Support and participate in SOX 404 compliance and Audit review activities.7 d2 m$ E/ z1 K2 Q
9 T- I9 r/ ^5 S$ S7 M9 H% w2 ~. @) F$ s
Education / Experience
- r( `; e! L9 r/ [' u• University degree in the field of computer science or other appropriate discipline;
. a/ J( s9 f: T' c* U; G• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
" Q6 ~3 j5 I3 b5 T• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; % J4 ], U! B% K8 p3 V9 I
• Excellent verbal & written business and technical communication skills; ! \/ b/ B2 o$ \' l
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
* V1 |/ h0 S. l3 S( C* }) F) u1 ~* B5 S4 P
The following experience would be considered a strong asset: 4 [1 c/ G- a ?2 z5 @
• Multi-tier computing architectures and middleware technologies; $ f& D# R3 a3 C3 ~& d
• Web-based and 3rd party access authentication mechanisms;
$ | t. c9 E$ j3 T5 V• Demonstrated technical and security solution leadership;
& X, J" z2 E6 d& U9 U! E. ~5 f' `7 f5 F! c- b j ?7 Q
Education Accreditation, Certificates and Licenses:
& D7 s2 E- ?& H+ @• Possess or be working towards a CISM, CISSP or CCSP certification. |
|