 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ' p, [, G7 j7 w/ r: j& K
Job Title: IT - Security Architect # M0 O; ~3 Y/ O; x/ \8 c6 x6 x
Posted Date: 10/22/2009
# T1 n+ g0 m0 r' h- SDepartment: IT-Admin
- q3 j9 n4 S9 i$ S/ F D. X9 U0 MClosing Date: 11/05/2009
& ?' ?7 S; A( s8 TLocation: Calgary ( k L5 [) g! t# F' b3 k
Full/Part Time: Full-Time
; o( d- z, e5 f0 H1 A- j! PRegular/Temporary: Regular
" ? O/ L' \1 p# T& [
@0 o% ]* d8 wJob Duties / Responsibilities
8 ?" J8 J- h4 t. \• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; $ b5 q2 g1 x! e7 G1 L* u/ c
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 0 T' D( L' W+ g0 l% {" a8 c
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
- f I* f! w6 c- c8 F, F4 o- H• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
) M! V* P3 i$ P• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
, [0 d, N% Z6 U• Share best practice opportunities and provide an industry experience perspective; ; f8 ]( l- I9 m. B- q M1 U
• Support and participate in SOX 404 compliance and Audit review activities.$ A. V0 H" v/ c
/ V5 g# H5 i5 ]
6 l6 N2 D$ {# n5 B3 |
Education / Experience; S- C( v! S' J( J
• University degree in the field of computer science or other appropriate discipline; ) I/ X- Z( T9 i* ~6 c
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ) I# U5 G3 }( l Z. n) I9 h$ p
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; # ^: I4 X9 Z/ Q) w# ^) L! E9 m P3 H8 W
• Excellent verbal & written business and technical communication skills;
8 _9 f; Y0 F0 u. I3 E• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
+ m* a* L) U5 }, `6 m* ?
, O3 D1 B2 X V% ^: aThe following experience would be considered a strong asset:
4 W2 Q3 s/ |. z+ V• Multi-tier computing architectures and middleware technologies;
g. n2 Q7 X$ W4 Z• Web-based and 3rd party access authentication mechanisms; # t4 q" Y1 J# I9 m
• Demonstrated technical and security solution leadership;
8 e- u0 Y7 e& R t, [' ~# Z" ]) b3 o) z, k
Education Accreditation, Certificates and Licenses:
3 m& o" k, |6 ~0 Q2 G2 G0 z• Possess or be working towards a CISM, CISSP or CCSP certification. |
|