 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
( U( n& z3 e- A8 U! @0 _1 ]% I9 eJob Title: IT - Security Architect $ V' k/ ~1 ?0 ?0 b+ v
Posted Date: 10/22/2009
9 F0 ?9 h4 O( q9 P3 b% a# s4 ?6 L) eDepartment: IT-Admin " U/ F' R4 ~3 s7 k! t* D; U
Closing Date: 11/05/2009
( d0 E# {- A4 i: D; ?) B6 S7 eLocation: Calgary
' \! ~" {8 t& }+ O5 [7 HFull/Part Time: Full-Time 5 }& I7 d& v* x7 i5 X f: A
Regular/Temporary: Regular
' p: |) z2 [( R% Q5 ?, X4 ~3 u0 Z6 b& q. P
Job Duties / Responsibilities0 ~& Y4 S; @" @0 H: S h- J
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
- t @2 L1 M1 k/ T8 w• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
7 G; @- c3 I+ ^% u# c, m, P6 z• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 2 q$ q; g! T( v
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
+ P* M6 W, c3 }3 J• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 4 J* J' D/ H4 ~5 b
• Share best practice opportunities and provide an industry experience perspective;
0 G6 U; Z2 m. T4 d6 ?1 r• Support and participate in SOX 404 compliance and Audit review activities.2 Y. L$ p& ~5 ~- X; m4 n; [
7 F3 @9 ?* ~7 M! [$ r
% f7 L' B; A! X- C: z; U
Education / Experience% a( [3 w+ C& T% `( D
• University degree in the field of computer science or other appropriate discipline;
3 H. |$ W" w* e4 u& E" W) q• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
( V3 |& j6 S3 E' N8 s• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 5 C3 M+ `0 z& _
• Excellent verbal & written business and technical communication skills;
) B0 C) A$ f3 \• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. & S9 ~( [* l% m8 |$ `
7 `9 Y+ h5 I& Z8 ~The following experience would be considered a strong asset: ; o* |! t3 q) c& _& b
• Multi-tier computing architectures and middleware technologies;
! j* A+ J/ `+ e( c• Web-based and 3rd party access authentication mechanisms;
9 k& T: ?% t4 g3 e. c• Demonstrated technical and security solution leadership; N: u% U3 {( a7 F" E5 B
4 j; z# G: G& j' E l9 Y6 O# r; OEducation Accreditation, Certificates and Licenses:
2 Z) m' D! \2 o5 t0 ~9 N• Possess or be working towards a CISM, CISSP or CCSP certification. |
|