 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 C* Y2 u! y8 r' C) d: q0 z7 w. m# n$ rJob Title: IT - Security Architect
. J& w. H8 U# g/ G% xPosted Date: 10/22/2009 6 H- ^+ X; d( J! o2 b
Department: IT-Admin
4 ], b( t5 S0 F1 G0 Z8 t( FClosing Date: 11/05/2009 / D1 j; G! `% ~- o3 Z
Location: Calgary 8 O2 t- L% p0 b$ a! F. R4 L" ^( R
Full/Part Time: Full-Time 7 n. R2 `/ O2 X! [4 }
Regular/Temporary: Regular * q. s' s4 p5 H9 a. u
( Q! }( ]$ |2 {- `Job Duties / Responsibilities
+ I& L9 y% l7 t* k1 ^; L• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; p8 ~/ U5 G" s1 y% M( U4 P4 P( H0 s' e
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 0 W; E" a6 e7 t5 P
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" u Q2 l1 m& O$ r( |• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
# i( e, P9 b- n& P/ R• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; " y' _+ j8 P$ }6 o: i `
• Share best practice opportunities and provide an industry experience perspective; 0 d. @9 z) q- [6 j) ~8 n/ }
• Support and participate in SOX 404 compliance and Audit review activities.. G- L& V" C& j) p) r. |* z$ a$ X
. g3 @6 k1 ]2 d
9 O9 r5 F M- h0 y( q+ x5 R2 V( F& G$ VEducation / Experience
2 f3 @5 d. i( _+ \! I• University degree in the field of computer science or other appropriate discipline; % ?& W* e$ ~2 H( a& z8 o& p; {
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
) R- Q0 q* ]7 Q, s; x% I% Q6 \6 [1 \% h• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 4 m2 |$ L" m; E. u d- `, k4 |
• Excellent verbal & written business and technical communication skills;
; C; v/ P8 p8 B• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
* g% _2 L5 K& l) A
, v7 q3 d( v2 b1 k3 w/ ^4 z( rThe following experience would be considered a strong asset:
3 e3 b0 W2 F* l! B6 X& E• Multi-tier computing architectures and middleware technologies;
+ H4 n5 H' [" j) n4 c• Web-based and 3rd party access authentication mechanisms;
* f7 K! ~! C! o• Demonstrated technical and security solution leadership;
6 [7 D$ V% n& ~% C) t/ T9 ?) [
; d0 N: o; r$ z5 IEducation Accreditation, Certificates and Licenses: 7 w% @# L5 ]. u }6 h0 B
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|