 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting - l }) M' u7 B( s+ y5 R
Job Title: IT - Security Architect 0 u+ x4 n- l+ E$ v( I, W
Posted Date: 10/22/2009 3 Y! _- n& Z6 S6 W& t
Department: IT-Admin , R& z$ j% }4 y8 Z
Closing Date: 11/05/2009
; G+ F: O9 g* MLocation: Calgary
1 h% r2 ?5 E7 J( L5 h$ O' Y) t3 [Full/Part Time: Full-Time
4 D2 |, j, `9 j; bRegular/Temporary: Regular
; e- T- s) W7 U8 m) _* b! m6 L0 d! [& B' a a0 m) t4 J4 G7 Y i
Job Duties / Responsibilities
! F6 a: P P* _ c• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 1 o7 n+ b Q. N8 G, ?5 ~8 N
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; / Z1 M8 O; G) ?
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; / f+ h* e# N6 b" W
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
C& p1 s3 A( A9 g& n8 N• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
3 C$ {$ z6 c- C! G ~/ r: ~- o• Share best practice opportunities and provide an industry experience perspective; 0 o) _2 ~7 q/ f$ j
• Support and participate in SOX 404 compliance and Audit review activities.
7 H1 S. c. U1 X& d ]) Y0 c4 L; p! y/ C) V, I; @/ I" n2 w7 z
6 l; n% b9 L; m9 ~, q+ k8 d2 d _Education / Experience$ n# w S7 h7 G$ n u
• University degree in the field of computer science or other appropriate discipline;
$ H7 G0 n3 {9 t- L. X• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; + ]+ s' b3 a- K5 M; p. z9 `# g
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
, d) Y0 A& P7 O$ E" A3 |6 I# \• Excellent verbal & written business and technical communication skills;
: w6 Y2 O$ N5 n( o# _) O, z• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
3 W/ u+ N) k' a2 d
+ g) @' L& o S! B! ]- pThe following experience would be considered a strong asset:
5 y W6 D; t( P5 H• Multi-tier computing architectures and middleware technologies;
0 P4 Q. g% i; e! X• Web-based and 3rd party access authentication mechanisms;
4 U. c3 b' c( S& B1 B• Demonstrated technical and security solution leadership; ) t. y; N: X& s* ~
[2 q( f! M, J! H, I5 ] mEducation Accreditation, Certificates and Licenses:
1 v- N( ?$ ~1 C1 A- H8 e' X• Possess or be working towards a CISM, CISSP or CCSP certification. |
|