 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
7 G Q5 } ^7 f/ G: {Job Title: IT - Security Architect
5 l1 D; x+ |1 \% B5 o* f, H/ f0 y. SPosted Date: 10/22/2009
/ r+ P! J4 x8 G4 r ~- n2 HDepartment: IT-Admin
/ j6 w" _% B$ zClosing Date: 11/05/2009 7 {; q" t- z) P+ |# V! t! Z7 _
Location: Calgary # H: e1 v% R3 y5 e4 \
Full/Part Time: Full-Time ' h: F4 b# {# ~4 q
Regular/Temporary: Regular . W% X0 |: U; T0 j' N& V
+ B1 {! a) `8 x: EJob Duties / Responsibilities! \* G+ m; C. v% w* A! R4 [& T+ I+ D
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 Z" ]/ c, a8 m
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 8 y m$ c! g' g8 n& z
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; # k1 }) M, ]& W N/ A
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 |; j% f1 P- t; M• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
* b9 S0 [2 s$ J* V" f• Share best practice opportunities and provide an industry experience perspective;
; N" K, l; ]) C• Support and participate in SOX 404 compliance and Audit review activities.+ l8 q6 U" Q8 Z. B4 z; J* k
# j- T. S* ?# u, t Q$ o8 `
4 v9 F( ]9 b- u: x2 eEducation / Experience
! h; N( n5 I0 X; N. E: ~• University degree in the field of computer science or other appropriate discipline; " ?( U0 {9 f- t9 G8 a I- ]
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
( b: q6 n6 J$ X* S3 |• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
0 ]5 `7 z0 g! b7 _6 |" t! j9 h1 Q• Excellent verbal & written business and technical communication skills; 5 v% O- D+ a, R2 b
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. # M* C6 R# E$ {1 T8 h, U# I6 C
+ K" O! M* h; @) v, Q4 ^The following experience would be considered a strong asset:
9 I$ ]5 k2 X& ~# T! w$ e$ T• Multi-tier computing architectures and middleware technologies; : N7 K% Q/ d+ {/ z" C2 A( Q
• Web-based and 3rd party access authentication mechanisms;
/ J6 `* r' c8 U# F0 r# F• Demonstrated technical and security solution leadership;
% G+ P7 M- T {# ~7 A8 P! E) N4 @+ ]
Education Accreditation, Certificates and Licenses: + x% a, x. c R! |8 t1 b
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|