 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
" y( h1 V4 |# Y; I8 G9 IJob Title: IT - Security Architect + ^7 v# Q9 v% g1 t7 b8 I5 s" V- e+ {
Posted Date: 10/22/2009 . j2 q. I' g5 X
Department: IT-Admin
) t6 a, t1 y7 SClosing Date: 11/05/2009
0 ^6 J$ g) ^# y, @! J! dLocation: Calgary 7 T: e. G: ~, G9 C
Full/Part Time: Full-Time
8 i& ^5 l! y8 }( }4 eRegular/Temporary: Regular
2 z% s# v3 {" |3 S0 l3 \0 @# X
) x4 f* [+ ^5 N4 d4 W6 m+ hJob Duties / Responsibilities
, ?; J7 ?% i! Q5 D) s. W• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
! p7 ]# f8 U% K+ C• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 2 E; G V' d U3 N. \
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ) ~1 o7 O+ I- }: ^5 D
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; % H4 G0 ]7 D) A' b- A
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; - L; M( X( c8 t) d
• Share best practice opportunities and provide an industry experience perspective; 1 P- Z3 x: ^, R J9 T4 j+ Y
• Support and participate in SOX 404 compliance and Audit review activities.* Q/ y* e/ t( w) u' Z+ a
4 w- A1 L- e1 R% o+ c
* C7 ]4 K+ K+ C
Education / Experience
6 D9 @: p7 F: s# r• University degree in the field of computer science or other appropriate discipline; 1 [. p! q- ^, A2 N+ w/ ]2 Y+ L/ y% k1 q
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
2 W* w* C/ B* i% A8 Q• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( ~! T% L0 ?7 [% r
• Excellent verbal & written business and technical communication skills;
5 } G7 j2 t% }% D+ x3 I• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 8 m8 Y8 S O0 @: l8 G, K. I
" L6 D, Z( H( T: [
The following experience would be considered a strong asset:
( I, H5 g6 n [+ Q/ z2 ~1 F- l, P• Multi-tier computing architectures and middleware technologies; 1 c) R$ `5 X: X. U0 i
• Web-based and 3rd party access authentication mechanisms;
+ Y3 F1 ^4 ?' F `5 L• Demonstrated technical and security solution leadership;
, D/ W# ]0 A- B: y0 v5 {/ o& `! F6 v- N* }6 Y$ G* a7 R
Education Accreditation, Certificates and Licenses:
7 I# ~$ H9 I) @; M) o" z/ v9 H J• Possess or be working towards a CISM, CISSP or CCSP certification. |
|