 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
7 X; [8 |' f; \2 |6 T! ~Job Title: IT - Security Architect 9 s7 F- ]7 g6 X( \/ G2 m. x" v
Posted Date: 10/22/2009
+ d5 I( R( p4 d0 v9 ?+ S5 _1 ZDepartment: IT-Admin / E* f& ?4 C* E: P4 c, j! `3 d
Closing Date: 11/05/2009 " [2 o; o7 v1 _; H! E
Location: Calgary
% ]; {4 V" @. i/ U" zFull/Part Time: Full-Time
( e& A, l/ a0 hRegular/Temporary: Regular 7 ]! f, P# I& I& w* V( t* B
i. J( e, U8 s, qJob Duties / Responsibilities+ i. @' ?0 D+ V0 D# n5 L2 h) H
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
3 Z2 f# ]; D' p! P• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ' Z1 n% ~( M( d* y, F* g# ~* q
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
7 b3 ?7 r; @' f8 a; R4 z7 ~• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
* D8 m8 D: I2 h/ s" \6 j* h• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; - Z# A$ a9 p0 S: C; U
• Share best practice opportunities and provide an industry experience perspective; ) C% |$ |5 n% Q+ j4 S7 t
• Support and participate in SOX 404 compliance and Audit review activities.7 y0 N# x- W, L8 s
) ^* w$ C9 t5 w9 G" v. Y
9 ]! X/ ~4 P& A3 Q' F5 dEducation / Experience+ T) _ Z, Z+ B& J1 a& T
• University degree in the field of computer science or other appropriate discipline; 5 L! t% S1 h( l3 {: l
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
5 }* p) H0 G% `0 g3 A. x% G• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; , p; l4 K% A; L* q
• Excellent verbal & written business and technical communication skills; 1 i- {: G4 }- X* h( X7 ^2 G
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ' _1 d6 [/ m8 r _* f
" H! ^3 C9 c( |/ X ^+ P
The following experience would be considered a strong asset: # P5 C- l+ J" t+ J+ G0 Y) j
• Multi-tier computing architectures and middleware technologies; , T* _9 g3 V, S6 T1 w
• Web-based and 3rd party access authentication mechanisms; 0 ?+ \. N" v1 `) C6 N, m
• Demonstrated technical and security solution leadership;
5 x5 H" x" J: I" |) b7 M9 r# ?4 J
! T8 u; Q6 W3 B+ @Education Accreditation, Certificates and Licenses: # \3 d: H. i m% U; W! P
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|