 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
/ p( [$ h4 v4 {" G6 u" yJob Title: IT - Security Architect
1 B8 l9 n. n+ K1 L5 Y5 R$ XPosted Date: 10/22/2009
: [" ~: |; l* q5 b" K* hDepartment: IT-Admin
" I( r" P6 b- V TClosing Date: 11/05/2009
4 F, U6 _' s6 NLocation: Calgary 7 j, m. U8 \/ r% I6 o' \
Full/Part Time: Full-Time
1 K+ i; e' R' TRegular/Temporary: Regular
3 e# j U# r/ I1 N$ |6 I7 G$ I- x5 T* q4 D- ]8 U2 z# J2 F1 ~
Job Duties / Responsibilities0 L e/ j) Y/ W! ~ g) \
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 8 X; b2 G8 O% J- [8 n* i; a
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
, W' K0 N; J6 G% J3 t9 N4 h b• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
5 ?0 a" N" |9 i6 L" M8 G6 O• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; + V2 \( I1 w" d1 }! ?
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
; F5 B9 S- J( {, _* Q: n# s* g• Share best practice opportunities and provide an industry experience perspective; 4 s0 h. ~# e/ P# Y9 P5 c! y+ j, T
• Support and participate in SOX 404 compliance and Audit review activities.
m0 p. M! t" ~- ]# R% B m E2 x# c9 |9 }: P# R
9 l ?$ j7 _) {2 C0 G. U" t6 O
Education / Experience0 U5 i7 i. T- H" k0 ]1 }& k
• University degree in the field of computer science or other appropriate discipline; 6 d% h) S1 q5 q& h, B* d$ E
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 5 A& Q! z( Q3 R' F/ v- t6 V) W+ c* z& Y
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; - P( Z% i% R9 H* X
• Excellent verbal & written business and technical communication skills; 5 m5 Q5 v& Q* p% k8 L$ o
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
5 K; U6 \6 t: @
" T! u; ` V# g1 A% qThe following experience would be considered a strong asset:
: Z; {% o, R9 Q" c, C/ f/ [6 p• Multi-tier computing architectures and middleware technologies;
+ y8 j0 g3 `4 S0 }" K# Y5 R' Z+ B• Web-based and 3rd party access authentication mechanisms; 4 a# E. T) w& c8 H- g
• Demonstrated technical and security solution leadership; : R) T% U* v5 v0 S* G- f/ j
' g: B. _2 q0 G% [+ V3 P1 }
Education Accreditation, Certificates and Licenses: / B* d+ {' ^5 C: t7 t/ L4 A4 t
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|