 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
6 _3 ]8 T* H( a* TJob Title: IT - Security Architect 4 M- H& B3 }% T7 A: z/ @' z
Posted Date: 10/22/2009
6 e% S% t! s/ b# [. e {Department: IT-Admin
7 A4 I7 b) X+ c' s' RClosing Date: 11/05/2009
4 C9 y' d4 s6 U2 ~1 y5 t+ m& dLocation: Calgary
, R; T: b/ e+ ?* |1 ?3 MFull/Part Time: Full-Time : s! I! X4 B5 L3 o1 L$ C5 ?
Regular/Temporary: Regular / ^- O5 n% ]# M3 f" d" A& z
% i, X, h* B; R7 ^) @$ jJob Duties / Responsibilities
0 }/ O0 P4 r" |( e5 r/ y• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
* U3 O8 F* G, E7 c' `8 ~• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; + q- }# e2 l0 n9 ^
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" x0 c: Q. Y& o! X+ F• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; + ~" L' P8 m* V2 v2 z- L: u
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; : n* ^, j! N$ M; d' Q" T
• Share best practice opportunities and provide an industry experience perspective;
- V- G' l) b+ F% x. D9 m u- I• Support and participate in SOX 404 compliance and Audit review activities.
. W, f0 R7 b j/ O9 B8 I V6 n' A$ T9 Q( A7 y( ?! q
# k7 J0 u$ N6 K$ h/ W! E1 {$ |Education / Experience
6 k- a4 p. f& j2 j, ] q+ k( f• University degree in the field of computer science or other appropriate discipline;
' S0 G" J3 `- D4 t1 R• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
9 w/ U" b' r' q; S( p' T8 x) F# m• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
4 ?3 Y& j' G$ T• Excellent verbal & written business and technical communication skills; 2 c9 p) k7 v8 ?, B. s z
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
3 K* S7 F- }/ {: [6 B7 ?, m# I) @- [5 q) r$ e. n$ C: y# r
The following experience would be considered a strong asset: # V% H% h) E N: n
• Multi-tier computing architectures and middleware technologies; # n6 h9 I$ {: i& k/ ?$ d
• Web-based and 3rd party access authentication mechanisms; ) k: q$ N) N) T* G4 }) d' m5 S* B
• Demonstrated technical and security solution leadership; $ C, I: K9 K, w/ L
$ ~0 h; A1 _6 _3 h$ R% b" }7 e# E
Education Accreditation, Certificates and Licenses:
8 Z7 A. s' { g; A. E. a$ `8 F• Possess or be working towards a CISM, CISSP or CCSP certification. |
|