 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
- [. p* R0 N" p; O& U, w7 XJob Title: IT - Security Architect
$ p: W. Y" @9 K& I. F/ h# z' aPosted Date: 10/22/2009
3 ^$ R! \' J# ]Department: IT-Admin
1 A8 F/ ]- g3 e# }( P7 V, jClosing Date: 11/05/2009
$ N* S7 J( b6 V+ o7 \2 |5 I2 ?' ZLocation: Calgary
0 e$ a, z, S t' w+ {( AFull/Part Time: Full-Time : W7 a6 O0 O9 ^
Regular/Temporary: Regular
1 q6 ~, @% C4 l! u r& L# d* H
! r9 R' T* x; v! _; {Job Duties / Responsibilities" B; Y+ ]! H0 }
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
( u4 j8 h- z! n; {9 A! m• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
* |" F6 K$ C# z• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
0 t0 I! m+ j3 L+ k1 l• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; # ^, u9 u& t- [
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; , S" r/ d& x% E' f0 P
• Share best practice opportunities and provide an industry experience perspective;
3 V& ~/ D8 x/ j j" C* p• Support and participate in SOX 404 compliance and Audit review activities.
/ E2 {% z( W$ n; }( O5 n. T9 W! \5 R( s a5 p' `
2 e; Z# R9 I8 D/ \2 |8 u7 }1 \& e, W
Education / Experience
0 @0 {. ]2 S/ j& Q# _• University degree in the field of computer science or other appropriate discipline; # C- P/ N2 x9 ?2 u' ]; c
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
& p# J- R) Y3 g& ~. l# \5 r• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
3 }) {3 h8 _1 F8 A+ s• Excellent verbal & written business and technical communication skills; 9 ^& K5 U0 u: X) f+ ~8 @
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. " Y+ d4 [7 p; X% w K
- C0 ?" B! k$ g1 r' R! uThe following experience would be considered a strong asset: - S( q2 P+ ~& f* F
• Multi-tier computing architectures and middleware technologies; ' c6 W$ w7 ~4 s4 n8 k
• Web-based and 3rd party access authentication mechanisms; 7 L2 D) x# K, b8 ?5 w
• Demonstrated technical and security solution leadership; 0 U# w1 P$ I% {2 t" i
/ W9 x+ u( q3 C% a/ ~3 ^
Education Accreditation, Certificates and Licenses: 3 X. E) q5 m5 ]! _1 S- \# k
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|