 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ' t* o8 ?6 I T) [$ \4 l6 }0 ~
Job Title: IT - Security Architect
" P7 U1 `( c* d2 y$ LPosted Date: 10/22/2009 . @) h( ` \: A- z' l, Z9 C
Department: IT-Admin & @$ Z) z* c" @0 x
Closing Date: 11/05/2009
' V% X: C0 i; o' F; y# sLocation: Calgary
: t: K* H0 h+ W" o7 bFull/Part Time: Full-Time
# k0 T6 ~: p3 x! W0 ^Regular/Temporary: Regular
8 P" B: m( V, V0 b0 V5 B
1 x9 ^4 B$ z8 I8 w7 Z# s( [! IJob Duties / Responsibilities) J/ h0 ~* n2 z. S
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; + |4 _& `. j: V% r# {6 U7 R2 w
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; - \0 r$ O: f: O+ j/ C5 q2 o1 U1 T
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
2 G0 i1 c; \5 o8 m: A& x8 o• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
' r M! `& g% V# b! Z• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ' P9 b+ q) M/ H$ X
• Share best practice opportunities and provide an industry experience perspective;
q9 O0 M% z" H/ ]• Support and participate in SOX 404 compliance and Audit review activities.3 V7 R# U8 t8 p. c, b
3 F J3 W }6 X, `. ~! R1 X3 r
5 S- R5 a* `0 e, ?! G0 A% J: g- _Education / Experience
$ Z7 W3 _+ R& R; r6 ]: c$ U9 q: j• University degree in the field of computer science or other appropriate discipline; ) d9 |8 m' [) k* `: m- D8 B2 v0 v
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; % H* Y8 \. K/ q: E; M/ z
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 1 H/ L; c/ p1 W0 c8 h+ D) {. N
• Excellent verbal & written business and technical communication skills;
' S0 x+ j" S% n4 u" {• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
. N: d0 @; k9 Q4 z# b5 V' ?! s1 X" X. N4 H5 W8 j* q& `# S
The following experience would be considered a strong asset: 0 w3 m, m% n R i, a6 K d
• Multi-tier computing architectures and middleware technologies; 6 v4 c3 j5 `! N6 o; X
• Web-based and 3rd party access authentication mechanisms; 9 a: q# |" x# a4 A6 l8 _
• Demonstrated technical and security solution leadership;
2 A, [: ?7 y) Y$ p: s! }6 f! I v4 n( `% n6 A6 s$ I
Education Accreditation, Certificates and Licenses: : p, ?) B3 ~, H3 s
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|