 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
0 d( I/ v" }. X: ^1 Q0 t0 R8 TJob Title: IT - Security Architect 1 v6 r) s3 z M$ j( ]
Posted Date: 10/22/2009 " Q' [6 r* ?3 O+ s5 j& T
Department: IT-Admin
$ g% v2 F; s- z% PClosing Date: 11/05/2009
& S3 m8 A; {- }% [Location: Calgary
" A$ Y- x. |, m' zFull/Part Time: Full-Time
( i( s7 E2 O* C- h& L D# Z4 u" HRegular/Temporary: Regular $ l0 X5 A1 ^/ B* F4 c9 p, E
$ I5 F3 J8 [+ b& {! C
Job Duties / Responsibilities4 K/ P9 x' H$ m, N1 C
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
! @, H# P7 a6 H• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 9 J N, B' J9 C( I) v
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
( N4 Z1 u0 |1 y• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
~8 V0 l: M3 P' |) o5 d• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
$ N# U. u$ Q2 P9 d4 ?' X9 x• Share best practice opportunities and provide an industry experience perspective; . z! F, G. b% ]+ t6 X
• Support and participate in SOX 404 compliance and Audit review activities.
5 I0 y) z, X$ N. Z# `2 I1 L/ r
: a* G4 l( L$ b c) d
& F' x! ]7 C e7 G) c+ b( FEducation / Experience
" D- R5 e5 |- u• University degree in the field of computer science or other appropriate discipline; ' j' B- P$ N* T
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
/ g! _0 m- ?4 S4 B• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 0 J5 X! w1 |4 B% N, x4 r% ~6 g. k: N
• Excellent verbal & written business and technical communication skills; 9 Q; B4 D8 b( n) X# o
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 6 E- b) B- ~- \# D
% z2 O/ _5 N2 e2 h
The following experience would be considered a strong asset:
( x- d7 N; j, V& ^+ h0 G0 n* O• Multi-tier computing architectures and middleware technologies; + {/ F4 N o) Y, Y" T$ W) P# D$ d
• Web-based and 3rd party access authentication mechanisms;
) N; ?: |5 Q: W- A4 _2 F• Demonstrated technical and security solution leadership; , ~8 |9 H# i% S# Z! K" M
6 C' J# d/ O9 m. H
Education Accreditation, Certificates and Licenses: , e, x6 x a! V3 ?* u) j2 m
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|