 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting - i1 `( o: t+ V: m9 n8 M) I1 m
Job Title: IT - Security Architect
1 v* V, U; @' SPosted Date: 10/22/2009 % a4 M( g6 g" q" s" g, @' J
Department: IT-Admin 8 M9 N9 j7 r& A; a t5 x
Closing Date: 11/05/2009 W' G$ U7 J9 `* o1 m) J) o' Q
Location: Calgary
+ {5 D) S3 y0 l4 f3 n$ SFull/Part Time: Full-Time 8 {+ w: s% _5 Y* r! [0 G
Regular/Temporary: Regular
7 Y* n; H0 J x, p
4 a: s1 f* B$ l9 y- v- zJob Duties / Responsibilities
- F( q8 M' ^4 |# Y• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 1 j/ V% B5 v m( D& s& u
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
2 ^0 N, g! h) F2 V; e i# _• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
. R0 \' |- y" _/ c8 Z! I• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
9 [7 e- l) C+ U# h. \: R6 v* h• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 8 T- y% t' s" W. U6 b9 w+ Y
• Share best practice opportunities and provide an industry experience perspective;
4 X# u* l2 V$ K' h0 v) i• Support and participate in SOX 404 compliance and Audit review activities.3 y0 A4 J# c% G4 ]9 v
- s9 S% x5 X# k$ h+ |% n, B0 Z& `
0 @8 \, }# L& S3 W7 }
Education / Experience/ e" L" l+ x. j
• University degree in the field of computer science or other appropriate discipline;
, D0 v" l- ~3 [/ Y5 n6 g5 {, _( p• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; $ Y+ v* `; @8 d3 a: B5 @$ g
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( F* a" a" J/ u& T; b
• Excellent verbal & written business and technical communication skills;
8 `/ {8 A$ t4 R• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
# A: s( |- s+ a
9 w3 H) n" z7 W. G6 PThe following experience would be considered a strong asset:
E8 A8 m5 n, ^1 o: o5 a) O• Multi-tier computing architectures and middleware technologies;
; o2 [/ K& S9 {, ^• Web-based and 3rd party access authentication mechanisms;
# q! ~& S( \9 W. E C• Demonstrated technical and security solution leadership; 5 p) ~* z5 R& l: f3 L
1 r; @) C1 o; l, U
Education Accreditation, Certificates and Licenses:
8 B( [7 \1 G* N. \- M, @• Possess or be working towards a CISM, CISSP or CCSP certification. |
|