 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
" A/ m7 Q, S; ]2 i( Y- ^1 I D" W! fJob Title: IT - Security Architect
8 W; X/ \; g8 m4 U4 y) YPosted Date: 10/22/2009
( @5 u8 P% \2 k- @3 ~Department: IT-Admin
* t2 K. w. @( y' \* d8 @8 v- wClosing Date: 11/05/2009
, f: ^9 } O& F# |Location: Calgary
5 F, c1 b: \2 u8 tFull/Part Time: Full-Time
j4 @" a+ u3 s9 WRegular/Temporary: Regular + ]- G' U' M1 N3 Z+ o" H
& F& f- @5 H4 q5 x# [2 R7 D
Job Duties / Responsibilities0 T* G w. B5 P# E+ v2 h
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 A: q5 j5 y" C) {2 o; ~2 E& X1 \" h
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
1 R' {. f0 Q2 c( {2 o• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 7 K) O$ L5 E) I# P# |/ s# s) X
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ) A( S" t, o, I$ v
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
0 m8 q7 o A, q q) ~. n• Share best practice opportunities and provide an industry experience perspective;
/ {& T! l# q) b' A• Support and participate in SOX 404 compliance and Audit review activities.1 B, O2 U. F+ u7 e5 `; u
6 _ t3 y# P* `5 l- z
& l9 l7 U8 g; G3 ? X; Y0 O% `Education / Experience* ]. w B2 e* h$ k3 Q
• University degree in the field of computer science or other appropriate discipline; 6 o0 C% @% I* D) D. A3 i2 j
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ) Y ~0 T3 O2 W: z$ V* U/ j
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ! g8 `! e; H4 F3 v, T! o5 @
• Excellent verbal & written business and technical communication skills;
2 ?. G/ |( H6 X/ w$ v& l8 I7 w• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. $ G' v+ Q7 R9 C! _2 d5 G2 V
+ Q. f, p* [. ?- i3 w PThe following experience would be considered a strong asset: 3 @/ x* P$ J3 V5 b+ f
• Multi-tier computing architectures and middleware technologies; 0 ?. ?- K- _4 ?* w0 H+ f; P0 D
• Web-based and 3rd party access authentication mechanisms;
0 d4 x: t( J B• Demonstrated technical and security solution leadership; 5 B7 i' X1 m0 a3 G& L
/ f0 w" h! W8 h
Education Accreditation, Certificates and Licenses:
* ]. M8 n, K% T$ I/ I" X• Possess or be working towards a CISM, CISSP or CCSP certification. |
|