 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
7 F: q: B' N3 X( B+ x5 s+ GJob Title: IT - Security Architect 8 r6 i7 R( d! T) {
Posted Date: 10/22/2009
6 @( p0 Q! q' fDepartment: IT-Admin
! ^) b$ b9 M. ]) A& l$ D4 Q0 |Closing Date: 11/05/2009 1 m& W1 Q; u5 k1 {
Location: Calgary
; Y% ?( d2 G5 b) c2 tFull/Part Time: Full-Time . O! y3 C7 K2 Z7 L' s+ W# y. a1 O
Regular/Temporary: Regular
; S& \0 H7 L' d! [* O* T% Q5 a% W
9 `" U- G4 b% V% PJob Duties / Responsibilities% m4 x6 Q9 x& \. F& E
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
- G5 a6 u6 L. E" k7 J* R& P• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
5 \! X$ X4 K$ O, B• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
5 J, J2 L+ h5 g' E% k2 A• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
5 P/ Q% k4 B$ \. ]• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
% g0 o* P/ H/ v6 P; B% _ i+ t• Share best practice opportunities and provide an industry experience perspective;
! ^+ M/ q R. {+ @5 B! l/ e; F• Support and participate in SOX 404 compliance and Audit review activities.) x. z, ^- |5 p; k5 a
+ I/ d# ~9 `& ?& ]
' w. W) y9 r8 g6 ?$ c" i5 v
Education / Experience7 o$ Y: @7 G# Z9 ?$ C0 g
• University degree in the field of computer science or other appropriate discipline;
4 e% R4 P, S6 c3 @9 p' J2 S, V• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
' e, S. u3 H. e# z6 T! n• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; $ j% d+ f) P5 p( G1 _* [
• Excellent verbal & written business and technical communication skills; 9 g% B: Z& O" z2 q! \- F( _
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 1 B9 r& w6 W3 ~3 ^
- Q/ j2 r+ X) L0 B! @
The following experience would be considered a strong asset: ! p+ P* c- B% o5 h2 p# x. Z
• Multi-tier computing architectures and middleware technologies;
0 D: a6 g$ @; M& G• Web-based and 3rd party access authentication mechanisms;
3 b ^: |- J" A+ v/ [3 f• Demonstrated technical and security solution leadership; / V( F% Z( c! n* a
; f/ J4 {# o/ Y: ^6 q) r) OEducation Accreditation, Certificates and Licenses:
' k, j. a; N. X• Possess or be working towards a CISM, CISSP or CCSP certification. |
|