 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
% p, a% I0 y& Y W3 ^' PJob Title: IT - Security Architect ' b1 b* B% R, [ z" Y* d' R* A
Posted Date: 10/22/2009
, y! w( A1 x' W5 fDepartment: IT-Admin
6 @6 J& J7 ^' w$ eClosing Date: 11/05/2009 ! v5 \6 Z4 L# ^( }
Location: Calgary c' K v9 N0 v1 f% \ Q, U
Full/Part Time: Full-Time
% |, [0 {/ u4 j$ \" z- oRegular/Temporary: Regular , u% H- h6 ]8 ~* r( e- _; A
7 `9 v$ d! ] DJob Duties / Responsibilities" h( e( d! S0 i3 o
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
3 {6 @' e! ?+ u. N• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
1 z% G3 N) d% M. y ~• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
1 s a* X! G2 U9 N$ Q• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
. G1 w& L* ^" t# I$ r* U- R$ m• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
# E8 Y$ }- |1 \2 i5 I0 {• Share best practice opportunities and provide an industry experience perspective;
6 N G8 M M7 B( T6 }• Support and participate in SOX 404 compliance and Audit review activities.
1 C0 l0 N7 A+ s" B4 |9 c
6 R+ V9 Z- g4 {! t3 E# N" l; D: p" [( y: V K1 o) t- N7 b
Education / Experience
0 Q! H0 t0 u2 ]• University degree in the field of computer science or other appropriate discipline;
7 x) ]* Y W. f" r% _- S• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
8 }7 g- N5 M2 V( x2 a: v• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 5 o- u& q [$ _- f
• Excellent verbal & written business and technical communication skills; L- V9 {4 p/ ^' q7 |
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
! r% \) a- x7 x( [
) I7 i: P( k) f0 NThe following experience would be considered a strong asset: 5 P$ e* t/ U: b& v
• Multi-tier computing architectures and middleware technologies;
/ w4 E" o* [5 W- E2 r• Web-based and 3rd party access authentication mechanisms;
& M/ V$ N; ]$ S( f' x& `8 l• Demonstrated technical and security solution leadership;
$ B) q2 [0 X9 x& ~1 A H+ \! X* ]" ~. b) Q9 ?/ ^* W! \* e- R* ~
Education Accreditation, Certificates and Licenses: 7 [" H9 g+ {$ D. D
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|