 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
7 F# [) d- m4 k1 IJob Title: IT - Security Architect
0 a8 O8 _2 m0 Q D+ F) LPosted Date: 10/22/2009
5 I9 l# g2 A8 DDepartment: IT-Admin 8 \. R# C. ?# J/ x2 s( \3 |
Closing Date: 11/05/2009 0 V3 D- U. C8 Z0 ^3 v
Location: Calgary
" Y) ` f9 x- x9 C% L8 d: }Full/Part Time: Full-Time 5 O' ?7 s8 |2 O: ~ ?
Regular/Temporary: Regular # X) W( z- P) m" L! A) L
+ Q* Z* _. F5 f/ mJob Duties / Responsibilities
; ]& b1 F1 w9 }; q% y) I/ N5 x2 p• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 2 i- {( M0 v) F: Z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; - o' _7 }8 t, X1 t3 B5 B
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 9 M, X) T( }7 a. k# S, K9 c
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 D% k4 O7 l9 J. E/ I• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
- _7 Q: J, o) ^+ N6 f/ M3 n' y( W• Share best practice opportunities and provide an industry experience perspective;
$ d! W% m6 g& G* C! c6 T• Support and participate in SOX 404 compliance and Audit review activities.
: c& B* p4 k: [! m# ]+ B9 s
/ o+ P x7 Q3 b& A2 L; o% M/ w" n s4 |/ T! M
Education / Experience
' ~% U, H; w$ c6 ~+ Q2 [* f+ ^• University degree in the field of computer science or other appropriate discipline; * c8 g* `. c3 I: F$ L" A
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
$ w4 r) y7 B8 P: ~• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
& b$ ?3 L8 ~6 K* P% P0 Q• Excellent verbal & written business and technical communication skills;
. j" M& i( l) ~$ h1 p• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ; ~# p" c9 {" J3 t$ }
2 }: M/ b! c2 x, W3 X* _1 u; zThe following experience would be considered a strong asset: + ~8 J) M' _) a0 F9 t& y
• Multi-tier computing architectures and middleware technologies;
" V$ U8 o4 o) B* G! O9 s; p• Web-based and 3rd party access authentication mechanisms;
7 R* b% g) R4 M4 X* |7 v• Demonstrated technical and security solution leadership; 9 F, s' w$ \2 z: Y) J& F
- H# B# V( }2 Y+ ], c# s! v
Education Accreditation, Certificates and Licenses: ; W1 u$ T8 _! G$ M- f
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|