 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
8 l3 T( E$ r9 c+ V% WJob Title: IT - Security Architect
3 ^4 q) C' X8 R2 t& l' F* n3 [Posted Date: 10/22/2009
8 i1 s0 i, Y7 b4 R/ kDepartment: IT-Admin
4 M* V' y5 K) s3 _2 l7 NClosing Date: 11/05/2009
' ? D/ o. k4 qLocation: Calgary
: r; x- k% Y7 t% N# P- {1 o( HFull/Part Time: Full-Time
, v- k7 O, E \2 `3 E/ jRegular/Temporary: Regular
+ s( o2 x5 j7 H+ J7 O, L$ \, H' d; L7 B7 E$ s& R- F
Job Duties / Responsibilities
+ n, r: k" h6 Y. G+ q$ ^) O8 ]• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; _7 w9 i) |- w# ?5 [
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
6 u6 O$ `* q+ v) ~9 f1 s# a' E• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
3 F; z. Q$ G& a. c$ O% l• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
, t C5 `7 X* v( Q0 ]. p4 N( I• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
$ \( h4 b$ U' p• Share best practice opportunities and provide an industry experience perspective; , I" h( c1 S) Y6 t
• Support and participate in SOX 404 compliance and Audit review activities.- l- t8 Y+ `- ~
F* y7 Q# q- Y) ~& a$ z5 Z: K: ?! [, d# D* U2 ?, o
Education / Experience
# X5 c0 L2 J( A+ [0 T$ d& n• University degree in the field of computer science or other appropriate discipline;
% o, P) ]- y$ [* q: [) Q1 P! i• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
; [8 l& Q, \( m1 ?/ j9 @• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 9 ` {8 q# `' |( R+ O$ ]9 W. M
• Excellent verbal & written business and technical communication skills; ) h6 N# l* j. u3 S' X/ ]$ B
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. - |2 \+ o: ?( ]! R5 F" g
0 R7 [: ?' y5 Y9 n
The following experience would be considered a strong asset:
- I, ^5 K4 O3 w* S* Q• Multi-tier computing architectures and middleware technologies; # B0 C- I" S6 U! h. t! s
• Web-based and 3rd party access authentication mechanisms; 3 ~/ E& j2 f5 F5 v1 O
• Demonstrated technical and security solution leadership; 4 E6 Y ~ {6 \' N B
: f I5 l) \( n0 K3 m5 g
Education Accreditation, Certificates and Licenses:
2 W9 X/ d' z; p3 w Q) @5 X3 Z• Possess or be working towards a CISM, CISSP or CCSP certification. |
|