 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
4 p0 b/ h0 ?. k5 J) bJob Title: IT - Security Architect
' B( V$ ]1 |' d: [8 sPosted Date: 10/22/2009
- P8 T4 l8 v5 [0 y0 EDepartment: IT-Admin
$ I j9 a+ A, OClosing Date: 11/05/2009 - V' e7 T y' t; x
Location: Calgary
: o" m0 e+ E7 a* H. d" s1 J: _+ rFull/Part Time: Full-Time
% J# k; f6 X5 S) V; C: g+ Z1 bRegular/Temporary: Regular , P1 Y' l0 ]2 J2 N
& D" Q+ b5 \0 Q: ~) E* m4 [ oJob Duties / Responsibilities8 J! W' M' B' B: E0 ~, `. H
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; # P9 Y+ J4 m/ j% p: V
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
1 ^% j4 P: j6 F* X3 Q) V B* @• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
9 c9 f$ q# r, W0 q+ Q* t) k• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 1 g, C+ c9 \4 |9 T
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
* Z7 `; L! v' g- I1 \1 L• Share best practice opportunities and provide an industry experience perspective; ( r" N% u5 q' _, z9 J
• Support and participate in SOX 404 compliance and Audit review activities.
$ a8 H. X0 c# l" E
6 {1 {6 j t' q5 g* f/ K, [5 h$ }/ E* \
Education / Experience
- g+ u4 J0 R8 C7 }% U• University degree in the field of computer science or other appropriate discipline; 4 X7 ~9 C, |9 W- z7 b0 A j9 m" B& J
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
: r" j8 E5 ~3 b6 I' P• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
/ B* P' Z: R: `( y) @2 q6 ? k• Excellent verbal & written business and technical communication skills;
# ^" @5 P+ l; d9 W1 s, z• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
$ @ v6 \. M- U8 m1 B- Y4 O0 V: i% N. g/ I8 T, X+ w
The following experience would be considered a strong asset:
# Z3 E' J7 g2 _6 G: @) N5 A; `• Multi-tier computing architectures and middleware technologies; ; `/ `! d) h# y! o4 r
• Web-based and 3rd party access authentication mechanisms; : w4 P, i I: ?3 {
• Demonstrated technical and security solution leadership;
# W) v6 b% V% Z& `& Q
! R7 w- g- f" O7 E4 f2 }Education Accreditation, Certificates and Licenses:
& p% [' x _# n% \( d• Possess or be working towards a CISM, CISSP or CCSP certification. |
|