 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting + ^0 }6 W( f4 k& ~& x6 k; ^( x
Job Title: IT - Security Architect
) U3 D- J, q& t4 uPosted Date: 10/22/2009
' S7 z/ d; d$ ] F# y. E3 _+ j7 N) eDepartment: IT-Admin $ }& x. a0 Z X+ a
Closing Date: 11/05/2009 3 r: G* }1 | r/ s# w" ^
Location: Calgary
5 A" m; p5 y# ?7 oFull/Part Time: Full-Time ) t4 b9 ^- g' \
Regular/Temporary: Regular 2 _3 Y) T* [; |9 b# |
, P& v+ f' |9 IJob Duties / Responsibilities
. j5 C) H. a& v! h: i• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
& R0 }" b, W7 v+ ^• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 9 ^3 L& L: W! f+ l3 m9 f' y% ]- R3 n
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
7 N. O) w2 Y. k' q5 o; J3 X* y• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 2 Y6 ~/ w$ B7 h. }; T t
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
# H" W6 e* M# K* R6 @* F• Share best practice opportunities and provide an industry experience perspective; 1 b( u' P1 h. x
• Support and participate in SOX 404 compliance and Audit review activities.3 x5 L% I5 j! i8 V3 E; q- R+ n
, ~( q5 W* e. ?$ y7 G% w
! ^1 J# F9 E- w
Education / Experience
1 p2 u6 A4 O, E3 N0 R" E+ ?8 K5 B1 P! z4 q• University degree in the field of computer science or other appropriate discipline; ' d' E0 i( r$ f+ ]4 w5 X: \/ p3 x4 P
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 0 ? E7 l8 d e% u. I
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ) C; C; ]) ~7 z# M5 V
• Excellent verbal & written business and technical communication skills;
( N! @0 s3 b5 J! w' S• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
8 E" z! a0 S5 x+ p* d) V( L2 m
5 P( [, g! x1 v8 r2 e, u. b! M( nThe following experience would be considered a strong asset:
) `' l9 H4 [3 L i• Multi-tier computing architectures and middleware technologies; : s5 q) p2 l* X( o# J0 R4 ^
• Web-based and 3rd party access authentication mechanisms;
+ C1 A; n0 r) }& X1 X5 F• Demonstrated technical and security solution leadership; ! L- U, F6 q: C' m4 ?
( N* i, F& R) `" [
Education Accreditation, Certificates and Licenses: & }8 `; `- ^; y% I" T& G# B2 V" I
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|