 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting & I# v0 ~! f3 E5 ?/ F% Z
Job Title: IT - Security Architect
4 d% |! b d: C) G; S j0 k. c( {' rPosted Date: 10/22/2009
; }( v; e$ }6 _, i& u8 V QDepartment: IT-Admin
; ^" t5 V3 m) g% g$ E U2 i/ tClosing Date: 11/05/2009 - \ S5 F, A/ S& k: }. N+ E3 V% i
Location: Calgary
' d5 k: ?4 ~' w, D4 ] @Full/Part Time: Full-Time 3 f7 D' F" \1 F+ |4 g0 G
Regular/Temporary: Regular
% @6 y! ]$ G: h3 \" K1 ?, ~) o
6 p2 o& s2 {7 U8 j/ `Job Duties / Responsibilities* h1 R) A6 f. }, Z
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 4 H6 [% \- v0 P0 B# E, y
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
9 a! U5 K9 q9 L b% O• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; % Q$ G) K. [. [% r6 z% b0 ~
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 7 d# K+ A( ~" g: W3 Z8 R+ w% ]# @
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 3 h: u0 E! Q) Q% I
• Share best practice opportunities and provide an industry experience perspective; + r1 K) Z' B# u/ s; d( H1 |
• Support and participate in SOX 404 compliance and Audit review activities.
, v; J# a# q+ V6 {. \$ ]
/ \- E0 l9 ^& r z
; v) V* Z: B! X6 Z6 Z+ K( m% DEducation / Experience
4 R3 `, O4 i) W- r. v0 f! [• University degree in the field of computer science or other appropriate discipline; 8 ~ E5 y' @0 }
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, B2 B$ x& r6 c7 E• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; , J3 c$ U; P. o: t
• Excellent verbal & written business and technical communication skills;
/ g5 d$ w( A7 M9 k* Q5 r• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
5 e# n$ Q4 ]1 M* W- _1 W) ^" g% p' ~# T
The following experience would be considered a strong asset:
6 ^) A7 ^- x. I+ V. ^• Multi-tier computing architectures and middleware technologies; ' ^: D4 F% U* W+ H; g" F; l) ^0 L
• Web-based and 3rd party access authentication mechanisms;
]9 h. N+ ?9 a' u3 z2 `• Demonstrated technical and security solution leadership; u( V* l$ \9 l7 x1 G
: M$ [1 g0 {4 H
Education Accreditation, Certificates and Licenses: " O6 J, P4 j* T9 p6 O+ m1 X+ n
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|