 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
, ]* d% w9 O4 z6 f. |$ v+ _. z8 FJob Title: IT - Security Architect ( d: h( c% R/ L1 _' h
Posted Date: 10/22/2009
- y/ v* K& m; F5 R) R, uDepartment: IT-Admin + t2 x% i1 M3 ]* k) V* Z
Closing Date: 11/05/2009 1 F; r5 r: _/ D ]
Location: Calgary . d: l9 P3 ~, `& a
Full/Part Time: Full-Time ) u; ], W4 p0 Y3 ^0 l- @1 j0 W
Regular/Temporary: Regular
3 i2 t( r6 F- m8 [
9 y2 y0 Z9 V9 VJob Duties / Responsibilities
7 Y6 @. v3 ]" d( `5 w- x/ s• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; $ Z5 \1 |. E0 @) a
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; # R0 R6 q) H- {' s ?
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; : ~% S2 D( F* L) z9 \: s
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
f3 H8 {# E) n+ t8 ~• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # N9 D: S) @* `
• Share best practice opportunities and provide an industry experience perspective; 6 f C) G6 c- |+ d U5 g
• Support and participate in SOX 404 compliance and Audit review activities.
% a( R+ H5 W3 D& R% L! N: ]% o" e1 \- Y
3 z0 K% ]/ f6 |& T9 p6 k* O# s
Education / Experience
* x3 d" _- T* z5 J" G6 i V4 Z$ j1 N( W• University degree in the field of computer science or other appropriate discipline; ; |( Z: k, K' O. S' n
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; l$ a8 V& r3 U' N2 i, i W+ z
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 9 U2 [9 P- E$ Q
• Excellent verbal & written business and technical communication skills;
# n) S5 |6 r5 }" {• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 1 H/ g( d6 I' z3 [8 X3 x d2 x" D
0 k* \, l4 P5 _! j" F2 T' y5 r0 i
The following experience would be considered a strong asset: & V* x* }; @! ?& a4 [( [6 p. Y* ~" `
• Multi-tier computing architectures and middleware technologies; 9 F7 y( i- b! u: H% [2 m9 y
• Web-based and 3rd party access authentication mechanisms; * {2 W+ n+ q$ Y- p$ t
• Demonstrated technical and security solution leadership;
7 N1 S6 L& v: k; h- T y) L
, m: k6 Z; J4 H% p2 Y6 Q* fEducation Accreditation, Certificates and Licenses:
% k% |% \% O2 F• Possess or be working towards a CISM, CISSP or CCSP certification. |
|