 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting # u( d4 z% E f ~' g# x" Q
Job Title: IT - Security Architect 3 {: r0 L+ t) H U3 Z7 _
Posted Date: 10/22/2009
% ]: S+ Q/ r; PDepartment: IT-Admin * B0 j1 H6 K; W- ?/ e8 `+ k
Closing Date: 11/05/2009 ' o7 e% l0 T& P
Location: Calgary ' {. H- K' a9 J- Q0 J4 _9 y0 @
Full/Part Time: Full-Time 4 L1 ~) i* k! Z& ]- z, p& W
Regular/Temporary: Regular
/ N' [/ n4 [) x+ \8 I$ m
) Y7 o' h. |5 j+ M. ]1 sJob Duties / Responsibilities
! R6 d$ X. y& j9 n9 u• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
8 d& G4 Q8 I( G& u2 F* d/ l5 i• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; : k& t3 u. o! r2 }/ W& {
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; , b3 i5 n8 M4 N! b
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
6 Y# [4 ~* z& |. Q• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
# m$ m; e0 A, f+ E5 |! |* @• Share best practice opportunities and provide an industry experience perspective;
6 T' H, k" c$ V7 v4 f; a! f9 g- G• Support and participate in SOX 404 compliance and Audit review activities./ _9 d6 ~& K" \, x; i2 c
% H3 j3 x$ P! }: a
8 X) c$ c$ X( g; O2 `) d/ G
Education / Experience
: O3 D- F9 b2 @* c. X" ?• University degree in the field of computer science or other appropriate discipline;
4 {1 o8 }: g% M# D( w: U0 p• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
" T# [0 J$ F1 k5 A5 X* r1 X( v• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
, _; |# ]" I* y6 J• Excellent verbal & written business and technical communication skills; 3 g2 Z2 m1 y3 J& Q
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 6 w$ d+ m5 z8 B3 x8 q C
+ m8 M, l/ V6 w; AThe following experience would be considered a strong asset: 6 M+ ^1 B( n+ g( E' {3 C( m
• Multi-tier computing architectures and middleware technologies; ) h) x; H- @- i
• Web-based and 3rd party access authentication mechanisms;
O1 l O9 O" ?6 U- O3 b• Demonstrated technical and security solution leadership;
/ P' [, f5 W e
. V; U3 k& n6 S4 }/ Y. l9 @Education Accreditation, Certificates and Licenses:
) H4 Y+ m1 q& F0 q2 W3 y3 e8 Z% G• Possess or be working towards a CISM, CISSP or CCSP certification. |
|