 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ; K/ x! L, _/ A- Q; r( E
Job Title: IT - Security Architect
, A3 w1 v* c$ z7 F, O2 ~3 `Posted Date: 10/22/2009
/ C# e1 f2 d; i& s2 CDepartment: IT-Admin ! t4 {( H2 ~( ~* g
Closing Date: 11/05/2009
# K; p+ ^/ l" c o4 M: _& }3 mLocation: Calgary ) ^! S0 I0 P6 j# @. x( ~% p3 R3 W
Full/Part Time: Full-Time
. N6 n; \5 y1 H5 LRegular/Temporary: Regular
% @ [1 x+ ] `( m. M4 r+ r- \: _# S v% v; ?3 D9 k
Job Duties / Responsibilities
1 ^! i3 h4 P( S• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
2 A- w; V; R; W2 O6 h• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 7 H' W3 @& A4 U* {' G
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
6 |7 u$ ?/ `# ?- F• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
" U5 J5 q9 c" a$ Q+ m5 W1 ^• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ N( x% G0 N4 d1 X1 V" E W• Share best practice opportunities and provide an industry experience perspective; 8 p6 j5 f8 g9 S3 u; u
• Support and participate in SOX 404 compliance and Audit review activities.9 t& L8 A$ V1 D- |5 Y! u
8 E6 U. ]" o% H2 {' }' Y
: @) g$ _6 p1 ^% e) z
Education / Experience
W+ Z4 e ^: o8 j; X, D• University degree in the field of computer science or other appropriate discipline;
. ?# h4 i$ L5 S7 H, J3 h• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
2 ^2 `2 p2 K# g$ f0 M• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 0 M+ [) ~! f6 Z) @9 I, R3 l* k2 F
• Excellent verbal & written business and technical communication skills; 4 x/ I4 f4 c0 E4 v
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
1 }* ?! Y0 W4 q4 K1 m, p! p" P* H n9 r' r$ i
The following experience would be considered a strong asset: ; O3 U8 N' K: a; p
• Multi-tier computing architectures and middleware technologies; 6 s2 Q. h- g9 y. t" m+ i8 j1 m7 r
• Web-based and 3rd party access authentication mechanisms;
( A8 N. \; m6 ]/ Y8 ^( }6 R A• Demonstrated technical and security solution leadership; ! Q; A7 m [" n4 ?
) R) o* U, }% T' \9 R1 e
Education Accreditation, Certificates and Licenses: , h8 p) @6 e( C. x
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|