 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 W9 s" u2 @! S) Y% JJob Title: IT - Security Architect
" x' ?5 N0 ~- N: DPosted Date: 10/22/2009 + i$ [1 ` v% _& P' T' w' l/ K: Z% ], q
Department: IT-Admin " I& ]5 a( G& ?# ?1 |% n
Closing Date: 11/05/2009 % h6 w s/ ]) N$ c O" p5 y; \7 R* y
Location: Calgary q, g; a; r6 i- U4 A
Full/Part Time: Full-Time % w) \8 ]7 ~: Y& z4 ~7 s# M. N( J! [
Regular/Temporary: Regular 6 H7 r) Y! J+ z* o
0 g5 t Q. O& X, h9 r9 f: {Job Duties / Responsibilities1 H' c3 S n+ R5 O& Q/ t
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
* Y! Z1 o! {6 s# g/ T# L• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
: v: U9 x" j5 S5 a• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
0 {* u' O7 k s6 q8 {• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
" q/ Y3 Q( |7 G ?! J• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
8 J% o' w+ L7 S+ K! I% t1 V8 Q6 J0 B$ V• Share best practice opportunities and provide an industry experience perspective; 6 V) B2 k& Z1 a% F4 w; o
• Support and participate in SOX 404 compliance and Audit review activities.# V& m- T' W6 T }
4 k0 a1 C* B9 G* v
" m% C; ?! R, Y" o( f+ P' OEducation / Experience7 T7 D' g, f6 T: {- f
• University degree in the field of computer science or other appropriate discipline; : @* G2 S' J4 Z
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; % F( o1 i1 G" Z$ O/ b4 h' |" I
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
# s4 W- U1 n3 y! G% Q# r/ ~' m6 r• Excellent verbal & written business and technical communication skills; 9 z3 k/ U6 T* M3 M( ]8 a: }
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. . J5 M: ~3 i6 H2 M& m& I4 Q
( ?+ R; R$ `% w& \( ]9 B
The following experience would be considered a strong asset:
* I2 u4 F, ~/ _- F, M' r% r9 g• Multi-tier computing architectures and middleware technologies;
9 W P' b1 r* H• Web-based and 3rd party access authentication mechanisms; # w- z( Z* J8 @
• Demonstrated technical and security solution leadership;
7 v: P4 h9 F5 E" W) N5 Q, R9 r6 p- C
: I' ?3 I ~; ?' ~7 C2 C! UEducation Accreditation, Certificates and Licenses: " C |9 ^! z; ]/ Y6 A7 T8 ~
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|