 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
0 T4 H+ H6 d7 a xJob Title: IT - Security Architect & W, J' M! X7 Y
Posted Date: 10/22/2009
6 ?" J! f- v9 ~$ n8 UDepartment: IT-Admin
$ B7 \0 h) M. m) F7 F WClosing Date: 11/05/2009
4 }2 R/ X2 d' K s. {, R% O& d% sLocation: Calgary + D4 K& B6 f3 \& C
Full/Part Time: Full-Time % e# v' o1 @0 `) @' x
Regular/Temporary: Regular - Z+ m! k9 Q8 ]* b5 g4 Y
% N* ]- d5 _5 m5 lJob Duties / Responsibilities2 |0 A0 Q+ P3 t% P6 c" b2 e$ F" x
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
/ n* U8 ?9 Y1 K) `• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 2 ~: Y1 x& F7 Q% _, e
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 7 m' J+ V, d2 v7 j9 Z% V) V0 ^4 B3 |! W
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; E: t: c- P% C9 w
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
: q' h, d; k0 `+ A1 M• Share best practice opportunities and provide an industry experience perspective;
' X q* U8 \7 g, Y& R! h• Support and participate in SOX 404 compliance and Audit review activities.) y" K Y1 A& N' s" @7 p
8 v$ k: t% U3 I. a! t+ ^& C
+ g: v; T' s9 f4 c: A' xEducation / Experience
. A/ d; x- ]) \; I• University degree in the field of computer science or other appropriate discipline;
4 G e' d3 s- ?/ x• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 7 B) t1 |1 T$ D3 g
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
; X: C, i( W0 M0 Q: b• Excellent verbal & written business and technical communication skills;
/ Z W8 V0 v% N; `0 E• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 5 t% B* J% i; p+ V& O3 s
* S; D7 o* [& H0 z& g- _
The following experience would be considered a strong asset: . b( ]) m4 n: H- u: [; d
• Multi-tier computing architectures and middleware technologies; + N8 r. p! `" A7 O4 S1 M
• Web-based and 3rd party access authentication mechanisms;
1 J9 s1 w0 Z5 r! }• Demonstrated technical and security solution leadership;
2 E, K- Y$ z3 W, w/ J9 s3 ?- H- d. g/ e/ d
Education Accreditation, Certificates and Licenses: : e3 a; @1 p& k( o3 }1 F
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|