 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
( ^2 [: K( |5 g! H+ x" y( UJob Title: IT - Security Architect 2 I6 T0 N) c6 |; Y. c" @
Posted Date: 10/22/2009
" D( M# |# r4 hDepartment: IT-Admin
* f7 r" J; v* \2 UClosing Date: 11/05/2009 `* o2 f6 Z9 u G7 c
Location: Calgary
% L; D$ G3 z- @6 n3 G% q) wFull/Part Time: Full-Time
9 T+ @5 d3 c& S1 tRegular/Temporary: Regular
7 c& u) ~+ X% T! q) h( u- ~
' e Z) D6 v# n1 f9 X8 c6 I) [( ?Job Duties / Responsibilities: j5 B8 \1 S9 g4 v2 E
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 g$ ?5 [$ z3 G$ |
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 3 e0 j( Y$ y, j c# a% Y
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 5 A+ S. l" n9 M& W: a
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 2 e% g" N1 A$ T( k; o b) q; a6 \0 b
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; " K/ e7 E! Q5 K% j" [
• Share best practice opportunities and provide an industry experience perspective; & w3 ^4 ^2 X+ a* q( |' A
• Support and participate in SOX 404 compliance and Audit review activities.8 N: ^+ d! a* E% p
: `: ?! }5 v3 T u* N5 m+ I4 z4 B# }9 G/ m$ F
Education / Experience
& f1 {% V2 W) E) c• University degree in the field of computer science or other appropriate discipline; @$ h0 G- s) u; y% w9 V% @* j# g2 {
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
9 b, {' R4 V/ k, Y- Y0 N8 o• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
# ^- e6 X) G! e7 [. f) g% k: _' t `* t• Excellent verbal & written business and technical communication skills; ! _$ c% t9 s1 m9 f( L. {4 f
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 0 ~( ]4 |' w( j: u: j9 l
" W1 Y! s" y. N$ M( v6 k2 d' f
The following experience would be considered a strong asset:
& B# L. w$ K% O8 A7 D5 \• Multi-tier computing architectures and middleware technologies;
4 Y* k0 ]/ L2 B• Web-based and 3rd party access authentication mechanisms;
+ ^7 f- k! w/ A6 k$ b• Demonstrated technical and security solution leadership; + d& z' H/ e& M2 B+ s" r) }
, P2 Q% Z/ V; z3 I5 `5 fEducation Accreditation, Certificates and Licenses:
; x4 T+ R" u6 n/ C- ^7 x• Possess or be working towards a CISM, CISSP or CCSP certification. |
|