 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting , Z1 Y* g6 {% |6 \) J
Job Title: IT - Security Architect
1 d$ C1 S$ h' t" T6 R3 iPosted Date: 10/22/2009
3 E: |. Q, D: o8 x/ y+ ]Department: IT-Admin
, K7 l& \9 ^4 z, H6 N9 d; r1 }Closing Date: 11/05/2009 , N8 L8 r5 P7 c8 ]3 f: q
Location: Calgary ' p8 S. h" L# I. G3 ~0 M
Full/Part Time: Full-Time
7 K Q8 K* @0 h, r1 @- b: U/ \Regular/Temporary: Regular
5 c9 |& }- H$ o) e/ [4 ]9 F# _9 O G( }+ i1 r9 h( c* e# E, s
Job Duties / Responsibilities
+ z% L9 ~% _6 ?9 g$ d• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
2 A6 k4 T7 b4 c• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
) N4 ^7 W- r1 {$ H/ B• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 2 g# _+ L6 w# q, \
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : r" {4 E% u8 x( p% [" O2 E
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
4 ^8 }+ C- |, T7 q: j; P5 ]' C• Share best practice opportunities and provide an industry experience perspective; ' p. H! @7 w+ R B# ]) d
• Support and participate in SOX 404 compliance and Audit review activities.
w L& X' c0 `( {/ g; a' d* c8 ]& H1 j$ Z
5 J) }$ @3 Z6 y2 k
Education / Experience, E) a1 i, A r- D2 V
• University degree in the field of computer science or other appropriate discipline; ! p3 a; t0 a3 j6 Q+ @( ?
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
! q8 d* _9 ?& f4 ^# C3 T• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; : F; \4 d' l2 T- X
• Excellent verbal & written business and technical communication skills; 8 y' u/ R& C4 [7 \8 d! ~
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ' N+ @* N6 B8 W, B: _$ R
. E* `0 n$ {+ w |" A& t- e
The following experience would be considered a strong asset: 7 i7 l" K- [" }$ P" Q: J( x' L- [
• Multi-tier computing architectures and middleware technologies; . U+ l# D$ c! s2 j! m; A) N
• Web-based and 3rd party access authentication mechanisms; 8 y: n6 b8 K+ X+ Y
• Demonstrated technical and security solution leadership;
7 Q0 u/ V2 s i f3 ~ H) E. z0 z @0 Y& [/ U- v5 ]* Y; S& S- m# j
Education Accreditation, Certificates and Licenses:
5 t" T, ?" O$ ]) s( r0 u• Possess or be working towards a CISM, CISSP or CCSP certification. |
|