 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 7 Y j& D! z8 m! H5 t& p7 E7 N; P
Job Title: IT - Security Architect 5 q8 G8 L. q/ Q' u( s
Posted Date: 10/22/2009 / _5 ?! v" N) g5 |- n6 p7 t R3 z4 U
Department: IT-Admin ! ]2 I3 W7 H% C
Closing Date: 11/05/2009 # A0 M6 s8 m# {5 l2 K6 ]2 u% S& f- s
Location: Calgary ) c" S& C; L m, V
Full/Part Time: Full-Time ! P) S4 V! O; X1 M1 k
Regular/Temporary: Regular 5 m' I6 ? v. ^
l) `7 G% g' l9 S
Job Duties / Responsibilities
. V1 o7 c T: f3 K9 H5 u( }( R• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 9 \2 g' A8 S$ J
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
. H. L4 U& A" u$ u* }: q2 Q• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; , O$ ]( l0 h& o6 A; V3 E
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
( G% W+ F( S4 ^4 S; b+ d' \• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
$ C; s$ Q$ `2 q$ f) r1 N• Share best practice opportunities and provide an industry experience perspective;
2 J5 q9 S0 t1 Z2 U: ]: s• Support and participate in SOX 404 compliance and Audit review activities.! p( {+ s# z+ b, q* J- b* t
; o8 U$ \- u5 j) j' g5 ~+ y& t" E. m- W$ |$ G
Education / Experience) G6 m; c4 I" ], g) s" h1 ^4 ~
• University degree in the field of computer science or other appropriate discipline;
' N8 w9 y( `2 m) ]6 ~7 \• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
" i( U, G0 [4 y+ }8 ]3 N• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
( x, }% @4 f& Q, }9 f9 ^- @• Excellent verbal & written business and technical communication skills;
% {) N) x/ O& S$ Y" x9 t• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
+ h+ K, x" {5 e( D8 _
- x; ` d6 D! t a% h, t' z( a& U& RThe following experience would be considered a strong asset:
8 I: p X7 o) b8 I• Multi-tier computing architectures and middleware technologies; , x4 k6 { `8 _
• Web-based and 3rd party access authentication mechanisms;
' N8 H! }7 ~; w9 U• Demonstrated technical and security solution leadership;
, d: ]* j9 c9 L0 e5 ]/ M7 g8 P8 l
# Q; z" L9 i. b" ]9 m0 \. F9 J0 b$ JEducation Accreditation, Certificates and Licenses:
1 |2 {1 E. x/ c9 ~: ~# [• Possess or be working towards a CISM, CISSP or CCSP certification. |
|