 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
" s2 P0 J" K! r: @7 g' C( gJob Title: IT - Security Architect
2 a- g# M2 c# S0 APosted Date: 10/22/2009
4 e2 S: I0 i" P7 H( `* sDepartment: IT-Admin 6 | s! o3 H8 R; \
Closing Date: 11/05/2009
& W$ n, T8 N4 s3 e6 b, D9 GLocation: Calgary ' C( t& B. |( l; Q! E
Full/Part Time: Full-Time
' A& { ]. X$ ?# `0 y6 i/ ORegular/Temporary: Regular
( ~, I: v! {; n) y; V F
% }5 Q. J' `) r4 r* s, W$ T+ p6 ~Job Duties / Responsibilities& U; F% A m5 L6 j; q5 E- g: ?
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ( U" c& p1 @# |
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ( d8 X6 d: ^& s( s/ n: b- P. v
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" j2 f ?1 U( F• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; - N# d Y1 G* w- b6 N0 q7 R' [
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
# P: u$ L: {* J/ w' T• Share best practice opportunities and provide an industry experience perspective; $ W% e0 p3 w1 X3 h. i0 a2 d
• Support and participate in SOX 404 compliance and Audit review activities.! N% O( \/ y; p2 }! X6 @: F
+ z1 {# j) E% F5 _# l! @5 m
" x$ z. N( ]( h$ _* O* mEducation / Experience' g$ S7 S/ u: v1 J
• University degree in the field of computer science or other appropriate discipline; . x& _0 o( l% J
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
$ i7 Z' G) I* d8 B' c( g• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 4 M; H" z! x! ]5 W. r
• Excellent verbal & written business and technical communication skills;
, K. f& X9 L1 _' {/ o2 u4 r, M• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
2 i0 ^: j! g' G0 H' p6 Q# @
. k$ G' b6 p3 k% IThe following experience would be considered a strong asset:
' K" i/ b! a' k k• Multi-tier computing architectures and middleware technologies;
. q* J/ U2 f$ \ h/ M# u: H/ Z• Web-based and 3rd party access authentication mechanisms;
2 [- T/ }% L+ E1 }: \1 D; n( r• Demonstrated technical and security solution leadership; 6 s3 O9 b3 @# x9 ^: W$ F. n9 ~% C
: C, G: p# N5 U% K4 V
Education Accreditation, Certificates and Licenses: # {4 q; A0 P$ t' d$ H I5 X* I8 i+ b
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|