 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
+ w0 W- R4 u! G& YJob Title: IT - Security Architect ( @" [9 F" R$ Y( D1 A
Posted Date: 10/22/2009
" ^7 m: W1 j; F1 s+ ?Department: IT-Admin
8 P0 R3 _+ p" Y5 XClosing Date: 11/05/2009
! T; E( z+ V2 i3 hLocation: Calgary
7 U; I7 t4 s. Z: k/ O- s: ?* _Full/Part Time: Full-Time , G- O( f8 h" q- {: k) w3 R
Regular/Temporary: Regular ; n: F' H5 q R$ F& C( ^1 t
/ X8 Q1 ^+ g, D" e/ uJob Duties / Responsibilities
, a1 ~( J% l r" j( s• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; - ~3 v. ^( z E* H9 I
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 1 a- S/ [& } y; w$ w
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; u& R+ w# ~$ j3 z5 _) ~% c
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
" t* z7 L9 b( I6 N$ H/ z& M• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 4 w4 P. M8 g& D) o H8 m
• Share best practice opportunities and provide an industry experience perspective; 5 _6 V7 o- ~5 U7 K5 I, o) C
• Support and participate in SOX 404 compliance and Audit review activities.
# D# ?7 q& \' u0 ` }
d. U/ X2 r( [6 u; m% v7 w/ V O- ~5 ~+ |9 r9 [/ w. O
Education / Experience
: p3 R' m# o+ p2 h• University degree in the field of computer science or other appropriate discipline; / b3 y* f2 ]& _+ g
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; v7 u% f* V: p8 Y+ Z( p( n' k
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
* r I" _! [3 T$ `4 ?0 |• Excellent verbal & written business and technical communication skills;
, c9 S9 @- g2 |. }1 K8 x• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
2 w/ S; k3 C. V$ ?
8 f( [) V) v' x( v- n. SThe following experience would be considered a strong asset:
; |5 l }, Y' b' U" s9 q• Multi-tier computing architectures and middleware technologies; % j, o4 s% n$ s( Z
• Web-based and 3rd party access authentication mechanisms; 4 O3 p! V* ~; F8 a* w
• Demonstrated technical and security solution leadership;
/ m' }3 _# _! X: T) `7 S \ T, {7 T
! p, y5 z" K# q/ Q. J! L1 {5 ]* @Education Accreditation, Certificates and Licenses:
- ~/ T; H2 y- ?6 S8 ]" u! g• Possess or be working towards a CISM, CISSP or CCSP certification. |
|