 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
& g/ P% ]7 w! fJob Title: IT - Security Architect
1 i6 _3 o! r( dPosted Date: 10/22/2009 0 N8 U" s& Y4 b! a- @' C2 [' Q) n
Department: IT-Admin " S7 |) B; {0 f$ ^
Closing Date: 11/05/2009
! c" v- Q: u2 [6 fLocation: Calgary " B- { B2 }, b/ r- ^
Full/Part Time: Full-Time 4 X# r" N; B. |+ m& u8 @
Regular/Temporary: Regular $ K# e8 S5 n) b, e
8 n3 A! F: W# M, c. [, |' P( ]: P
Job Duties / Responsibilities9 G R! q2 a' ]! O( f, J0 s" t6 q
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
% D0 Y4 V# ]% P7 n% m9 i4 w; ^• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
/ o/ n7 {7 C% l8 P• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
- Z8 d. ^' B$ T4 x8 E. ~! P1 _- l• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 2 R$ B0 _' F% V( _5 y7 L' J
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; + h! b6 e B$ m! s0 Q# I% a- C
• Share best practice opportunities and provide an industry experience perspective;
* B8 x& }* z- }# D3 c• Support and participate in SOX 404 compliance and Audit review activities./ M2 B) ]5 z. K7 x
1 p7 O+ l: L( R* Q$ N; L% O, p7 D
+ d& |; N8 J7 H+ v, j; H! VEducation / Experience6 ^0 `0 u4 r5 J9 Z2 p; Z
• University degree in the field of computer science or other appropriate discipline;
$ ^( H: D: U2 J• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
6 n6 G& `7 E3 h7 E% h• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
6 L& `- D% x( y Q% ?8 z• Excellent verbal & written business and technical communication skills;
( N: r( Y' X( U; c. J• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. / k9 i* y( [, ]+ x: B+ P! Q
, G( o% E& u8 C" I
The following experience would be considered a strong asset:
S# Q0 ^( S4 t! x. _• Multi-tier computing architectures and middleware technologies; 9 [# @. l. j- @1 O- h
• Web-based and 3rd party access authentication mechanisms; & o! T% @) d$ @% V
• Demonstrated technical and security solution leadership; 9 |+ v1 i2 o* x% d
* L; P+ J& J% h& K0 ~
Education Accreditation, Certificates and Licenses:
" j& `# B% o: I. `2 o: F! u& O• Possess or be working towards a CISM, CISSP or CCSP certification. |
|