 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
4 m* G- h7 O# rJob Title: IT - Security Architect
; V0 B1 R- t5 e6 p. L' WPosted Date: 10/22/2009
3 T$ [6 j% Y/ [+ R$ E4 s8 `1 _Department: IT-Admin
) O. U8 r3 {$ y% d# KClosing Date: 11/05/2009 ; U' b, s% n/ K+ ?% J
Location: Calgary 0 A! d9 [) v' E! v. H" |
Full/Part Time: Full-Time
+ ?( F# m5 _+ I2 tRegular/Temporary: Regular
7 r/ ?+ i5 m( n# A9 }! ]" r' u7 Y- b) T, K1 a; C
Job Duties / Responsibilities
8 ~( |& X' o# }0 U9 p• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; . r C- v+ k1 S: j* B
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
/ X# f4 S2 B3 d1 `% U• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
* m& C r& a) D1 ^1 H: F7 m• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 6 l& I k4 b' R: ]7 e0 L- u
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ ?8 p3 ^' ]% D$ m' q* q7 {4 K• Share best practice opportunities and provide an industry experience perspective; + H" w# g$ U1 I6 ?
• Support and participate in SOX 404 compliance and Audit review activities.$ q4 c* `! {) S% Z" |+ D5 f5 p @
- e7 w3 d! y, c! G: d
- V$ M: V7 c/ {3 v8 W1 z, mEducation / Experience3 a, \( _1 Q5 ~* G: x3 u4 G% j
• University degree in the field of computer science or other appropriate discipline; 7 G: H+ V$ P5 Q5 v9 W0 ]$ ]4 z# w
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 2 G8 n- ?9 r5 c4 p Z
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
7 _/ g- F- L: J4 I. q• Excellent verbal & written business and technical communication skills; - U7 j. B7 p+ x2 P B! |6 C
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
" J9 N( ~" L& n+ f' F6 n5 U5 Z( O1 b
The following experience would be considered a strong asset:
5 M C( {* }# r& a6 o• Multi-tier computing architectures and middleware technologies; - M9 B9 c$ E% ]
• Web-based and 3rd party access authentication mechanisms;
! L8 j0 G+ q% Q. O' X• Demonstrated technical and security solution leadership; l A% l: k' z+ Q! i
# l& Y Y' T& U; MEducation Accreditation, Certificates and Licenses:
$ b$ x* ?. N( _• Possess or be working towards a CISM, CISSP or CCSP certification. |
|