 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
4 q0 M) H- Y: F+ m6 l4 w1 H. EJob Title: IT - Security Architect
9 b5 g! o0 b; k5 \. d( xPosted Date: 10/22/2009
* U9 [% e& g0 z5 rDepartment: IT-Admin ! {# f! b7 {( W0 Y1 U8 p
Closing Date: 11/05/2009
+ ]5 `5 U) }9 SLocation: Calgary % e2 J2 d& S0 a9 U
Full/Part Time: Full-Time 4 g9 s* T) E, c5 |% _, E
Regular/Temporary: Regular
( @5 H% l' q9 E$ t+ I9 W3 ]% K) `+ B/ e0 n, T
Job Duties / Responsibilities
# C' P( Z) l) S& q5 e$ w( X• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
3 b6 I/ [) [/ U3 k• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
! @9 y& O$ G$ D" L, o* g• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" P. Y* P- y4 i7 o: ?9 ~/ Q6 Z• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
! z$ {$ \( `3 I7 V: C2 H• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
' Z/ p8 w6 Z2 H• Share best practice opportunities and provide an industry experience perspective; : Z; C) p3 ?! y: E' V( V$ W
• Support and participate in SOX 404 compliance and Audit review activities.
1 l5 X+ _6 A% ~- w Q! q6 j! b7 {1 O* W; o3 o( L6 |2 J( @
* C8 V5 d) v7 KEducation / Experience2 h: Z8 h, Q: X
• University degree in the field of computer science or other appropriate discipline;
B; I7 k- Z0 K) W9 R, v0 w• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; + m/ f8 Q8 ]4 {6 O
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
; x. w% a& y) y: `• Excellent verbal & written business and technical communication skills; * r& N, B( W S1 y1 J+ A
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
2 S& s9 ?3 N' c3 f$ Y( ]( V
9 X: {) g' p$ O" g5 M$ b% ]The following experience would be considered a strong asset: ) I. }3 ^1 o1 ]
• Multi-tier computing architectures and middleware technologies;
( n" r% X, O; M) G. P• Web-based and 3rd party access authentication mechanisms; ) ~7 ^. R# @0 c8 ^
• Demonstrated technical and security solution leadership; 1 e! n) @8 [7 T5 u' K" G
6 [5 u' W3 k+ A" Y4 G) hEducation Accreditation, Certificates and Licenses:
6 K* c2 C& x4 n- y e• Possess or be working towards a CISM, CISSP or CCSP certification. |
|