 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
7 e% `0 ]8 e' Z: f5 TJob Title: IT - Security Architect 3 i, e+ J* w3 i4 y1 }
Posted Date: 10/22/2009
* q d c0 ]/ @3 ^Department: IT-Admin
/ j9 h& l' l% Q- G- ^$ GClosing Date: 11/05/2009
, K5 I. p# y3 z% B. |% c. y' VLocation: Calgary 3 Y( }; m+ ? P, }6 T7 C8 j+ y G
Full/Part Time: Full-Time
' n, H, G& c/ u8 t' |1 d7 |Regular/Temporary: Regular / ~0 E( w7 K+ U( U3 X) g4 x; z, g
% {6 M' S7 H8 ?1 H! N7 l: u' i; [Job Duties / Responsibilities- n2 W( o6 `7 x* ]# ` u; `
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 9 w' u: x S+ l
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 3 w! `' [) s- v) R
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
; }! g" W% d6 g• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
! Z, Q: P7 i- f9 f" f& Z• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 9 ?- |4 v* w3 q& N) o5 P
• Share best practice opportunities and provide an industry experience perspective; 1 H; x) P* w- n- E2 l: b3 w
• Support and participate in SOX 404 compliance and Audit review activities.8 Q) @) d4 `; z: D) x9 ?
5 F8 `/ X2 Z) N3 X; N
) W/ L: u) W) q1 [% @1 L
Education / Experience
* I% ~, g4 U% _3 E8 Y• University degree in the field of computer science or other appropriate discipline; 8 g/ Y2 T8 u) R% y8 y8 I: f
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
( m8 P0 [# T2 U' D z3 v% Z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; - \) |! b$ I5 A3 }: Z& C" M' J: l, [
• Excellent verbal & written business and technical communication skills;
h$ Z/ ]- ~. L3 N; q# {, \• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
& u- b$ F" z+ d0 d& Q! F; H) S# y+ t* L+ U- X" c
The following experience would be considered a strong asset: * J, J: t$ o F% K1 L3 T
• Multi-tier computing architectures and middleware technologies; / l9 X1 S; H: h6 V+ w
• Web-based and 3rd party access authentication mechanisms;
) r8 R5 f: b* v6 l5 B+ a3 ^2 f' U• Demonstrated technical and security solution leadership;
u7 H/ X; o/ k" w* Y/ s3 F
$ D# D+ p8 m3 p! l! K6 O) cEducation Accreditation, Certificates and Licenses:
" A7 Q* d" N7 W9 A• Possess or be working towards a CISM, CISSP or CCSP certification. |
|