 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
/ B+ Q. ^' t; p9 f( IJob Title: IT - Security Architect ! W6 q# e" b% m$ L8 \0 N
Posted Date: 10/22/2009 . b! Q! O0 b! u9 i M# ]
Department: IT-Admin
: s( M3 \' t: N# b' f8 XClosing Date: 11/05/2009 & ]7 r P& O4 ~
Location: Calgary
4 v9 e8 f8 N! Z7 |Full/Part Time: Full-Time $ W; h/ d$ N o: o/ z. Z, [
Regular/Temporary: Regular
p! `" x! \$ M8 U
1 `% Y0 Z; R2 y6 q& QJob Duties / Responsibilities+ b3 n" V( b( m7 S5 E$ X6 f. Q
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 6 a6 ] W; S8 M1 {4 U
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
L/ A9 M5 _8 y8 e! q• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
4 ^0 b7 J# B; j2 _' J• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 4 d( J+ v4 n7 k5 c5 s- @
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ; t) Y# t8 p7 |- B8 b4 g) `
• Share best practice opportunities and provide an industry experience perspective; / i2 C G& C4 |! [* V) q
• Support and participate in SOX 404 compliance and Audit review activities.
4 [/ U& B6 a" U7 `3 K( R. E
9 p/ h" ]4 Q$ D0 U$ M8 T9 w: w' v
% j7 W8 ?; U ^ L! F |Education / Experience; }5 ?3 k6 v) H( s
• University degree in the field of computer science or other appropriate discipline; & b7 }7 e2 o) K" H% [. e( @
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
3 f; u, ?, W% c• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ' I( t3 V, G. c. }- x# c3 |/ x J
• Excellent verbal & written business and technical communication skills;
4 P+ s) p# z0 v8 D' l ?( t• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
0 s& C! p2 x* y) [! |7 `( \6 i) I( ?- b9 J3 q y) b
The following experience would be considered a strong asset: 7 s% _# a$ g( O! e7 D
• Multi-tier computing architectures and middleware technologies; 0 t& Q; t# h7 t6 U) Q+ ?- f
• Web-based and 3rd party access authentication mechanisms; + s1 m. g, Y3 \( ]/ t3 G) x
• Demonstrated technical and security solution leadership;
0 v: H4 c+ e. n! R% L# R$ [
+ s2 Z# e/ f: ] D% E9 yEducation Accreditation, Certificates and Licenses:
) ^+ s) Y5 Q% R; u% {3 T• Possess or be working towards a CISM, CISSP or CCSP certification. |
|