 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 6 o1 x+ U; j" w) @' O% a) r& P, f
Job Title: IT - Security Architect
% O. y0 D8 V( i( _7 nPosted Date: 10/22/2009
. `* p% e$ {( o& y, Z7 _5 \. bDepartment: IT-Admin ( w' x5 E+ k4 a" b5 \% b) O; {4 K
Closing Date: 11/05/2009 4 U; I# N& h0 t7 u, G3 j
Location: Calgary
, M% f* e. J; \: k, cFull/Part Time: Full-Time
. x: E5 u6 t1 h* \$ ?7 V9 l9 C9 w- ?0 ARegular/Temporary: Regular
G5 J/ p% H" e5 O W
5 Y, C. ?! `& I( _; e- jJob Duties / Responsibilities
' u/ D$ { ^0 G+ U+ `) g+ ?0 D7 u• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
$ b; h0 Z7 s3 k* V9 O( u v* }• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
. h) i1 W3 q: z4 K9 F• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
6 j! c* c: `% s+ M8 B1 B \• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
% _# P& |: M7 k; W• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 4 K+ \. u' D3 f- W- s5 v T
• Share best practice opportunities and provide an industry experience perspective; # X9 h. G/ V$ k3 p
• Support and participate in SOX 404 compliance and Audit review activities.
S7 [5 J; f9 `# F2 b7 b+ _( I6 x# G# g/ Q/ D6 d3 f
/ M' B. X9 T4 s x2 Q* `/ Y) CEducation / Experience3 |% [9 e: ]5 u! ~6 H! [
• University degree in the field of computer science or other appropriate discipline; ; G" _3 Q, p: B, j1 h
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; $ q5 P' c* _' a4 q) I% A
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
0 Q& v) u8 C- H( ~! T( o6 x: j• Excellent verbal & written business and technical communication skills;
0 {4 u- l# p1 N• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
. r: _' t& M; ^" n/ S3 {& R* @9 p n- F
The following experience would be considered a strong asset: : O; {+ g" G+ b# S. y
• Multi-tier computing architectures and middleware technologies; 0 q" T1 \7 P" z9 u r5 z0 q5 o
• Web-based and 3rd party access authentication mechanisms; 4 a/ J! u" v& m! ?. H% V) _
• Demonstrated technical and security solution leadership; * s$ R) w' m, h
& C9 a( l7 }* `: n5 P1 iEducation Accreditation, Certificates and Licenses: 6 V+ A4 \9 l* B" ?2 ~
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|