 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting # | w1 @% a/ O0 ^ L( s* p, }" [
Job Title: IT - Security Architect 8 t I1 s+ ]# Z8 d# ?' t' H# `" B
Posted Date: 10/22/2009
: n: A0 s/ K6 {2 `3 d' zDepartment: IT-Admin " Z2 |/ r/ @4 h3 `, g0 B' {
Closing Date: 11/05/2009 7 w7 s+ k k* N0 b( Z
Location: Calgary - c/ `, Q4 Q+ Z& r$ l( `
Full/Part Time: Full-Time
: j' d7 A# W, x; l; T+ @+ ]Regular/Temporary: Regular
; `, }0 `6 w0 @3 g" J
9 |& c0 Q- O( U/ K4 AJob Duties / Responsibilities( {; z z9 j2 v5 N2 y+ J y9 \
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; . f" @2 |4 k& n
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
. A6 `* j5 P5 o% W0 T, l• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; - g% |* s- n V5 _2 U p
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 1 S; W5 Z! ?# z
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ) n' } \4 Y: v3 F* Z
• Share best practice opportunities and provide an industry experience perspective; 9 \# L! g0 n! t/ B" X+ }6 O; s
• Support and participate in SOX 404 compliance and Audit review activities.
) Q5 v) \7 e$ t+ _/ g2 B/ n2 E, G5 M+ w1 T
) }% i" v8 w$ n. ^' g7 lEducation / Experience
" o; ~0 Z; c; M' l• University degree in the field of computer science or other appropriate discipline; 9 _* @* D S" }* {) c" `# s
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, j8 `* s; ?2 r• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; * n2 N0 ]0 S! [' t$ b M
• Excellent verbal & written business and technical communication skills; / [/ ` l" `( K
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
# E% l; |3 l( y& H. }% L5 z' b2 J" e0 b9 W" [8 J& ?
The following experience would be considered a strong asset: 8 c7 e- B# C. O4 F% ?* ]/ U
• Multi-tier computing architectures and middleware technologies; 5 i1 s! K3 H# T* b) N$ Z* w7 T
• Web-based and 3rd party access authentication mechanisms; $ R- ~+ d, v9 O+ Z, T
• Demonstrated technical and security solution leadership; 7 b$ F: b6 M2 Y
8 `, k ~0 t9 c3 B* x; d2 DEducation Accreditation, Certificates and Licenses: " X' l6 ?2 X! w/ e, v- P9 d5 f, F. Z
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|