 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ! C* T6 f3 h* I1 y
Job Title: IT - Security Architect . e4 I1 X) w6 l/ {! l2 _( M
Posted Date: 10/22/2009
; k7 l7 l0 [: F; ? K7 A( ]Department: IT-Admin 4 P Z4 }. m- U7 `$ P6 g5 R) D. x
Closing Date: 11/05/2009 / d: b# x2 e: Q: S) d, h
Location: Calgary / u: y* A% F1 y! V4 j, [/ u
Full/Part Time: Full-Time 1 D: a; S+ G K& H0 b
Regular/Temporary: Regular
w3 a }+ [, S1 i4 U
) u ?# t5 a4 M; g7 o+ ~3 P( i0 eJob Duties / Responsibilities
5 Y+ |7 X$ c) J5 c. `• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; : L# A8 n; `+ C0 V
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
% ?6 O; F5 Y' z8 E3 V1 h• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
% V& V/ `9 T V& ~• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
% p0 T9 P5 S. z1 P8 ?( d) d" @$ a1 S• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
8 [" H `2 O" L, D, H0 b1 k• Share best practice opportunities and provide an industry experience perspective; " a6 |1 _' r6 Q
• Support and participate in SOX 404 compliance and Audit review activities.
1 @ y G5 Q+ U, D6 w1 V- m) y
! K' L3 S+ T. O
4 t/ h( A. X& d1 N# T$ B1 }7 tEducation / Experience
7 M! Z7 t6 o" W# [% U/ B• University degree in the field of computer science or other appropriate discipline;
y% v* A: ]% G2 T5 V4 W• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; - M: ]0 Y. C, Q j) b) d ?
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 7 e2 J4 u3 t: d" s' L
• Excellent verbal & written business and technical communication skills;
2 N+ ]; X" B$ q, f• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, b6 q, f- f" `4 L9 e$ s& X: D. A. r
0 b0 N3 r: j d( z1 i6 l# }The following experience would be considered a strong asset:
+ `* ~5 v6 g/ Z: t+ D8 E5 D+ {• Multi-tier computing architectures and middleware technologies; [; f. m) m3 |5 N
• Web-based and 3rd party access authentication mechanisms; " x1 q, J6 {1 W/ ]9 i
• Demonstrated technical and security solution leadership;
" w# F# e1 g. m
- t3 l7 q! @: ^! DEducation Accreditation, Certificates and Licenses: ; M4 D% G5 d a, |/ \" L
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|