 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ) T/ B2 y6 L& m# A6 D3 |
Job Title: IT - Security Architect . t1 [1 m3 h$ S) K
Posted Date: 10/22/2009
9 U8 R3 \% i6 }. ]; `Department: IT-Admin
! u- D y' B! Q; EClosing Date: 11/05/2009
6 z+ ~" b7 v5 q @- CLocation: Calgary
7 }2 V2 u! s6 N% e4 N5 C. L, l8 `: hFull/Part Time: Full-Time
^, b/ [2 a7 f7 `6 PRegular/Temporary: Regular
. C& A: @4 a$ \/ j9 s+ i9 z- h, ~1 @* s% }* d
Job Duties / Responsibilities
4 Q3 Q$ x# _% z• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
3 r4 S) ^0 l: I; v2 M- W, T• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
; u7 ^. V3 ?$ p3 A# `• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ( y' x' `) P# ^- D
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ) U( e; H/ A$ ~& K& y
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ( Z. D2 ^% ^+ {" q3 h# C
• Share best practice opportunities and provide an industry experience perspective;
. q+ ]1 x \6 R: y6 I• Support and participate in SOX 404 compliance and Audit review activities.
! n2 X6 X; u$ _$ E, y& c8 t1 ?: p5 k8 ~ C' m9 L `
% a( V# @. z X; FEducation / Experience0 d: w; U/ b2 O9 c7 i. e6 X
• University degree in the field of computer science or other appropriate discipline;
1 ~2 g- m/ g& h }3 w! c" P• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
( Y/ ?* X9 |! B• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
4 @* J% X4 @- H* ]• Excellent verbal & written business and technical communication skills; / d* _0 Y) n( f1 `4 J
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. & t, [8 q7 f$ N* l' }" V/ j/ }
" e5 V- {' }9 t8 G2 c, vThe following experience would be considered a strong asset:
; t6 U( M$ K+ l! Q& y0 X# b• Multi-tier computing architectures and middleware technologies;
1 B* e! W% H1 G% T: y8 y• Web-based and 3rd party access authentication mechanisms;
" N8 I' y) @& g5 }/ R• Demonstrated technical and security solution leadership;
8 q# e* J9 L. W, a& n% x3 {6 Y5 b1 } j# |
Education Accreditation, Certificates and Licenses: # x5 }$ w) K- V; _
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|