 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
* n! u% t, ~ cJob Title: IT - Security Architect " C3 L" X$ c7 t/ R& d
Posted Date: 10/22/2009
' C1 @3 q& l7 VDepartment: IT-Admin 1 \2 @& h9 W! J* o) u9 x. D
Closing Date: 11/05/2009 * z" k' K2 A2 i0 Z, s$ {
Location: Calgary
$ {/ t2 U) N% j# h: `* N2 zFull/Part Time: Full-Time
1 _2 `* e& M1 uRegular/Temporary: Regular 6 v' y. s6 k) w! q; m
. a9 G9 y; u M) z9 }
Job Duties / Responsibilities7 i- @% D' p/ { X5 i. ~
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
+ }' u: ^; R6 ~: p# h8 H• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; # ^; j l* i3 k; m4 q3 u8 m+ }3 y
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
% e$ h1 G- F, l. G9 Z+ O- L7 i• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 6 o, z6 x, d# |. y: d
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 0 D$ u7 M9 I9 Z+ Y9 U
• Share best practice opportunities and provide an industry experience perspective; 9 F- W2 ]/ B* l& c# Q
• Support and participate in SOX 404 compliance and Audit review activities.
' a4 V+ j3 p# @3 n7 i5 _
& s7 k- ^* o! s, d# K% q. t8 \% ~: p; Y5 M w
Education / Experience6 S5 n m! h5 z% r6 A3 g: X" X6 i
• University degree in the field of computer science or other appropriate discipline;
i/ z, A7 W" k3 T7 Y5 ]• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
2 w* {- [3 h( ?* d• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 s* ?! G1 N# }( O h# e1 `• Excellent verbal & written business and technical communication skills; 5 H6 r; f$ K. k# `7 s: j. |& J2 C
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. " u4 L. x+ r& K2 _2 Z+ U
4 {3 I4 X7 S# P# @" t
The following experience would be considered a strong asset: + e( H' k; ]3 v3 v% l1 l
• Multi-tier computing architectures and middleware technologies;
* O3 n% r3 p" D/ w( O! a% N$ O• Web-based and 3rd party access authentication mechanisms;
?7 t+ b% G; H' B• Demonstrated technical and security solution leadership; & Q, C0 }* u8 c+ g a
) @3 j& K# ]5 ^4 n/ |, a' `2 BEducation Accreditation, Certificates and Licenses: 8 i2 c- o! k6 M- \' e5 C2 B
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|