 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 P, A9 m) S6 b' SJob Title: IT - Security Architect
t4 l, A+ Z: CPosted Date: 10/22/2009
* v6 K" D- b2 c3 T, GDepartment: IT-Admin 4 ` e, G& @- i; U+ Q2 q5 s
Closing Date: 11/05/2009 , A. |) ?4 h t% d
Location: Calgary
! s( _9 X5 [8 {# J9 |Full/Part Time: Full-Time ( |- z" J0 k, G9 p6 J
Regular/Temporary: Regular . f2 w9 t* G$ V/ z, k
! w$ A5 p v# G- ~" [0 h& mJob Duties / Responsibilities
1 w) L$ p j" W U* D• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
9 ?, Q& f- A5 @! o# u: D• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
8 o4 G, I/ c! u; P• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 0 T& a" @+ R) P. y8 s
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ; B& E- A- _( A9 G* i5 ^
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 9 l8 V2 x: ]9 C- @( m6 h6 g
• Share best practice opportunities and provide an industry experience perspective;
; J; f. T4 E8 I( n9 `4 }1 {* R5 D• Support and participate in SOX 404 compliance and Audit review activities.8 x1 V. x' A9 J! X" f+ e+ D
/ g9 R( h$ a; U6 e0 l1 ^! q
1 ~; H- f, D* B( Y, lEducation / Experience8 R5 r' ?+ `: ?
• University degree in the field of computer science or other appropriate discipline;
# q2 n8 B( f9 ~: {3 G& g- n* x" t• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
3 |* y5 @5 E& ~/ J# t• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; " @+ G% n' N/ S' K
• Excellent verbal & written business and technical communication skills;
8 Y: v! {4 j% ?9 X" S• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
: C$ g1 }/ P" q* D" `$ T' w) j9 c. K* ~) A5 @( F8 F. U
The following experience would be considered a strong asset: * p4 C3 F/ K/ H) b% m& W
• Multi-tier computing architectures and middleware technologies;
9 k8 b3 B$ ~$ e; r1 W$ M7 [• Web-based and 3rd party access authentication mechanisms;
0 a+ S2 y. T4 }- d' Q+ n- Z6 [2 ^# z• Demonstrated technical and security solution leadership;
& V, q: S& o) h, J6 J9 I4 F' W* u9 W2 W3 a" x) F
Education Accreditation, Certificates and Licenses:
. ^* D% [4 ]% O, D! q, [• Possess or be working towards a CISM, CISSP or CCSP certification. |
|