 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
) L, M. P3 W( f. {# u1 Z" r" LJob Title: IT - Security Architect
, N# Y& `* q5 [* K& lPosted Date: 10/22/2009
+ j& J4 U Q4 a, q2 ~Department: IT-Admin . M9 Y4 l2 N9 H& e& z$ y
Closing Date: 11/05/2009 " n( p9 a0 ~. L& ]. ~1 v
Location: Calgary 5 K) s! b! s( H) v
Full/Part Time: Full-Time
, U+ v! L9 P0 b9 W6 \Regular/Temporary: Regular
" m: ~& I m) @ k( n5 ~( ~, e4 H3 n
, f" z6 M( M$ p5 f" s8 H6 L( H, _Job Duties / Responsibilities* B. f, b. u/ q: {
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 9 u' F; Z" F0 Y) g. z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
) X3 N! ]3 z6 S• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 9 k$ W' @( P4 ]5 h1 p2 @
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; " ]! e' R: d. Y9 z# D
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; + M% G5 w9 Z/ Z: ~( i% Q
• Share best practice opportunities and provide an industry experience perspective; - y; [/ P5 s9 S" B" s2 q+ V# X
• Support and participate in SOX 404 compliance and Audit review activities./ v. |! f8 V% M- [3 t
$ @; w( j/ `: h/ B7 D
u5 V3 y6 i9 v& i' Z+ hEducation / Experience
2 c G V, \: {# g* W0 Z; p• University degree in the field of computer science or other appropriate discipline; / X4 A, b( ^6 H4 z
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
$ n9 G& s' ?' g l7 d• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( D M! p0 T2 ^- h) U! p& }7 h
• Excellent verbal & written business and technical communication skills; 2 u9 U" i# l: f6 d! k: f! b N, J+ ?1 U
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. - w* m/ a! e' t+ o
/ E7 p% D8 K- m* b0 }) ~8 TThe following experience would be considered a strong asset:
Y7 w2 L0 o1 W% R2 U+ J+ c• Multi-tier computing architectures and middleware technologies; 8 Q) X% U, Y4 O, z( t9 N
• Web-based and 3rd party access authentication mechanisms;
4 \! a0 l! C2 Z$ G: z# _• Demonstrated technical and security solution leadership;
4 Z4 g7 q- j- B% w6 o/ B+ u" i9 R+ s$ w( f
Education Accreditation, Certificates and Licenses:
& O3 b# ~) F0 z: {0 a j• Possess or be working towards a CISM, CISSP or CCSP certification. |
|