 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 h, o: G8 P. E oJob Title: IT - Security Architect
; \' X) l5 V) p- @Posted Date: 10/22/2009 % g. F( l2 E1 K& L* x
Department: IT-Admin 1 M7 Y# h# u/ I; A) y$ m* d1 I# T- b
Closing Date: 11/05/2009 $ P& ]2 G$ |' C9 E
Location: Calgary 9 c- |5 X6 V$ I4 E E+ D. {
Full/Part Time: Full-Time 8 Q, H+ q# D3 `8 k
Regular/Temporary: Regular
k7 T6 v! ?* }+ j: Q' U( T( ~ u, }
: ^7 \) [! O; j& GJob Duties / Responsibilities
% }9 K+ c" r) q5 O• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
6 O9 d0 r4 t- u3 e7 v• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; - ]6 v( l1 d. z$ N% A% B
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
# ] C8 E' X% I s8 m• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ; S i8 N4 z, |6 L. m3 t8 S% V
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
2 q: r& M1 g$ s+ K9 |8 m• Share best practice opportunities and provide an industry experience perspective;
0 Z1 x8 P' n8 x8 y: @• Support and participate in SOX 404 compliance and Audit review activities.: ~# y, \4 |/ K7 c: G
; k. J+ w4 s( ^- m+ q, ]2 O+ Z, j. d1 H& Y# _9 Z& ^
Education / Experience! @: A- \6 x8 h3 w q: b* S
• University degree in the field of computer science or other appropriate discipline;
* k0 Y# b7 q& M• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 0 B9 c1 _3 H: r8 I/ O
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( X2 Q2 O9 W( u P
• Excellent verbal & written business and technical communication skills;
( r0 t( [. `, J" G• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. . q, V0 C+ k! |# B0 E; v
+ U' a; I& k2 ?0 G1 X ?% FThe following experience would be considered a strong asset: : T0 \5 K8 H, _) @- m" s( @& L' ^
• Multi-tier computing architectures and middleware technologies; 1 \0 N. e2 E$ I3 p- m& }
• Web-based and 3rd party access authentication mechanisms; " y& [) ]; Z, q! }9 e1 Z
• Demonstrated technical and security solution leadership;
0 W4 O9 B9 k* `
! u2 l* J+ d' V, A! GEducation Accreditation, Certificates and Licenses: x. s: e. u q i: A8 b7 C
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|