 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 3 L! F( Z1 l+ L7 ?! V
Job Title: IT - Security Architect m0 z3 X0 X/ ?; S% L; ?0 u0 ~/ R, [
Posted Date: 10/22/2009 " m$ X' E4 S1 Y2 c4 N! R) x
Department: IT-Admin 7 a) Z# E) ~# M; Y. M
Closing Date: 11/05/2009 / G/ y7 j, k6 E/ U L
Location: Calgary
2 U3 }- J! Z/ `! r! w1 v, W5 _Full/Part Time: Full-Time
4 Q/ v% Z0 M9 S; d! X" P; RRegular/Temporary: Regular
; ~( E& o& T4 h. e
( v @; a" C8 ]( @' r0 q& E$ YJob Duties / Responsibilities
3 M I- ?9 x" C" _+ k• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 6 H% W1 c& G9 f* s2 x5 m
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
) ?" [+ I/ X7 y" o8 {1 \' O& c; Z• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
# ~! e+ y; o L2 d0 p0 @% S• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
" h$ D. ?# K4 [) t, m4 ~ k• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ A( V! S! U" \3 J0 c; N• Share best practice opportunities and provide an industry experience perspective;
$ ~' Z- u. b. s! r+ c7 C! Y• Support and participate in SOX 404 compliance and Audit review activities.
% C( m' \# ^& y+ Y
6 E' K- {+ q9 J: X4 a
' [0 J7 G9 ?& y! T) N( g: HEducation / Experience
) T4 O0 ?. h$ f' m" ]• University degree in the field of computer science or other appropriate discipline; 5 b3 W! h0 P8 N+ _
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
/ B) B$ G3 V T• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
' |% O! K* ^' ^. M* e• Excellent verbal & written business and technical communication skills;
! a; o( p! l2 J/ U7 T$ j; P4 f8 A• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
; @2 \6 u5 x1 G; J; @8 i
& f1 e8 j9 o) y' C' e1 QThe following experience would be considered a strong asset: ; o% y9 c4 Z- F
• Multi-tier computing architectures and middleware technologies; . N) z ]$ M" ^7 ~/ B% G0 V2 c0 a# ^% Y
• Web-based and 3rd party access authentication mechanisms;
; v5 S5 H' D& q0 E• Demonstrated technical and security solution leadership;
2 K2 a% [6 R! C! w
) F8 b7 D; g& q" yEducation Accreditation, Certificates and Licenses: - V2 q% Y+ \6 V7 y. d) H9 Y
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|