 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
. m; i- k0 _3 t3 B$ P, JJob Title: IT - Security Architect
6 e, I+ J9 G/ O# z ~$ h+ Y# U# lPosted Date: 10/22/2009 ) r) `* W9 S0 a
Department: IT-Admin ) H0 W: L0 Z2 j7 a2 X
Closing Date: 11/05/2009
3 a+ F( N7 S+ R: ~9 s* h zLocation: Calgary
0 j+ v$ o5 m% g; L" Q2 KFull/Part Time: Full-Time
" B$ ~( D$ ~% v) c1 z, r& @1 JRegular/Temporary: Regular # T, ^3 B8 ? h4 c8 c, T# k, U* e
+ q0 Z+ u& n! l, `' m. }Job Duties / Responsibilities
( A: E* q2 Q8 P! W; r• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
2 V1 E8 ?+ t* o7 F+ `$ P• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 1 k2 `: U9 S6 G% z3 |
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; * X. f% d9 t- l- p6 Z; K& M
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
7 }- s N' E: [$ F9 P& H' Q• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; % {1 _. d% p, {/ s: i5 M* k
• Share best practice opportunities and provide an industry experience perspective;
; Q9 @9 ]) B2 n" n) |# j6 G) o% R• Support and participate in SOX 404 compliance and Audit review activities.
* g3 E) n: y' K! P' ?) I V4 P- L3 z$ j' ?8 r
8 o9 f0 P" b, X+ s
Education / Experience" x' _* O" n' m( e, H8 L7 U" o0 C
• University degree in the field of computer science or other appropriate discipline; . d7 o, V$ w, G+ U4 e
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
. d3 _" g8 I2 k) [/ x$ M1 L! `7 {• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 3 ?. u8 N" j+ t
• Excellent verbal & written business and technical communication skills; ! V; p# A# a I( R. ?0 V
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, j5 {4 r" d, O d% x( V! f# H" q' g p7 r; o7 U
The following experience would be considered a strong asset:
- D! p- Y2 n2 ~$ k3 d2 J• Multi-tier computing architectures and middleware technologies;
) v, n2 C) J$ H) Y• Web-based and 3rd party access authentication mechanisms;
) W0 b) H+ v' C0 Z' s. O# Y3 _• Demonstrated technical and security solution leadership;
5 j% A# x8 f2 Z! d* k% L! Z% k k8 j" i W+ M
Education Accreditation, Certificates and Licenses: 4 }8 r5 R( ]) ?: i
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|