 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 6 x6 s# @+ `& [3 Z5 n7 V$ h. \
Job Title: IT - Security Architect 5 {- ~" D5 J5 J; G- a4 r8 H2 L- I
Posted Date: 10/22/2009
* K, ?. _' X6 n! RDepartment: IT-Admin / \' d, I6 @1 B/ B
Closing Date: 11/05/2009
, ]$ J% `0 I. R b' D4 p* YLocation: Calgary ^" g- Y* K6 S/ b; c3 N( |
Full/Part Time: Full-Time
( F6 l9 W& Z! E* z. [6 ]Regular/Temporary: Regular 4 Q4 Y c8 _, B9 R+ L+ Y+ m0 m4 M
$ k" E+ n$ b& q! _0 v% T' F
Job Duties / Responsibilities1 T. @) {* W+ K& ]$ t& G4 t
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 V; J/ G! I1 F! T5 u6 a! O. o* S% Z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; b+ o6 K# Z$ B
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; , D7 o' v6 }3 W% H* ?
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
" @1 ]6 t, Q- m9 }' J% E• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
# t) N: p- J/ }9 I$ B' Y U• Share best practice opportunities and provide an industry experience perspective;
+ [# g2 a3 P. k; O• Support and participate in SOX 404 compliance and Audit review activities.
4 M- ~9 ^+ R' W4 G$ f5 P# P* b& @* X' ?; k
N% W7 N" a) }Education / Experience
4 w% C9 L8 M+ ?• University degree in the field of computer science or other appropriate discipline;
/ k4 X+ U. f) c, R+ d. u• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
+ m# `! ^# j6 X& }& Z0 @ d0 X' d4 Z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ! N o8 |' U% a; o2 d8 A
• Excellent verbal & written business and technical communication skills;
% ] q9 M& h: X. |1 u l$ o• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ! V: d1 u1 W$ S5 g% X+ L
3 }! Q6 M, L9 D1 M* D/ e, O
The following experience would be considered a strong asset:
8 t6 q7 O9 D' Y+ Y; }7 s• Multi-tier computing architectures and middleware technologies;
- W) o0 `; n0 A• Web-based and 3rd party access authentication mechanisms; , D: h8 b( ~! u& r: d; q
• Demonstrated technical and security solution leadership; - @. p# A% X( l+ }; h2 z
^- n J! V: I* CEducation Accreditation, Certificates and Licenses:
7 D5 x/ I u+ n' f. \1 y" a• Possess or be working towards a CISM, CISSP or CCSP certification. |
|