 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
0 p4 h$ `7 q+ M% H v5 }/ bJob Title: IT - Security Architect ! Q0 n' H/ S% {* R
Posted Date: 10/22/2009
: P7 C+ ]& e: _9 tDepartment: IT-Admin 9 o. n Z$ {7 Y6 A, t
Closing Date: 11/05/2009 5 E& Z9 l: C2 W2 o
Location: Calgary
" y; e1 ~, `7 @. GFull/Part Time: Full-Time
9 Q- o5 b$ Q- `6 }; e9 bRegular/Temporary: Regular / ?. k" E! I6 n
2 p) {4 r( X( j
Job Duties / Responsibilities
1 i) H Z+ b; g$ ^' c+ V' N( q• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
t% F3 z2 j9 H4 ]• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; $ c( g; \, U+ X$ {7 K% s5 b6 K
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
* I; N. H, p, N# e/ h' ]• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
2 \( g* P% B0 T4 |% O• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
$ M( n# T& [4 O8 j( |0 z• Share best practice opportunities and provide an industry experience perspective; 8 P3 F5 h' S* {; R! f) K4 @
• Support and participate in SOX 404 compliance and Audit review activities.0 a% O( g& V" J4 T% v& x7 r" s
0 T, L- u' j3 x$ N9 @, j) |
) g& @- p* y3 H9 u/ n# u6 aEducation / Experience! b# R* l, ~* Q6 C% @8 n- |
• University degree in the field of computer science or other appropriate discipline;
( e' N& J, L, C3 N• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
- P4 L% _+ l7 E• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
8 q& q0 `) S: k• Excellent verbal & written business and technical communication skills; 0 O5 F; q3 m" f( t" m" t$ ^
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
( k5 z+ B/ ?4 A$ M5 m' T# h: b) j5 g. o" B
The following experience would be considered a strong asset: + Y$ {% i! U5 p( R& C- R' G
• Multi-tier computing architectures and middleware technologies;
5 Z+ ^* p6 X7 A1 k• Web-based and 3rd party access authentication mechanisms;
) I& Q. w9 d$ T• Demonstrated technical and security solution leadership;
6 E' _$ O) w8 o) W" g0 U
2 o' v+ g9 Z; S. vEducation Accreditation, Certificates and Licenses:
1 e1 z8 o! L4 z4 R; ?- @3 [• Possess or be working towards a CISM, CISSP or CCSP certification. |
|