 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
! A. B* S+ v% r! oJob Title: IT - Security Architect . B& q( p0 U6 r; d% I; ^/ `
Posted Date: 10/22/2009 ) o' ?( Z7 ^# x8 m: Z& x O9 [3 ^
Department: IT-Admin 7 E% @& G$ _+ [
Closing Date: 11/05/2009
/ j% F) q2 B( m( pLocation: Calgary 7 N5 S) R9 {, Q X6 w
Full/Part Time: Full-Time 2 R) Q) J4 ^: u' P; @! l- V+ e
Regular/Temporary: Regular
, O. P( u" ~5 A5 Q1 S" P4 z! X
Job Duties / Responsibilities4 ~) e: D2 I- M9 O g* K: L/ N
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; & \% ^. Q6 X: C7 W+ _
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 0 w. H& Q! }( T5 n1 a* v
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
: i% x- F% [' T4 @, @+ k" N7 v• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 5 r7 d k( l6 O. C
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
- I q9 q8 [* x3 L9 L5 ] T9 Z' ?• Share best practice opportunities and provide an industry experience perspective; V9 u- a, P0 a
• Support and participate in SOX 404 compliance and Audit review activities.
& {" c/ ^0 x* a3 M$ \ ]
5 X1 O( Z4 P) b
2 |- M5 t: A. C+ Y4 PEducation / Experience' F3 d/ |: |$ z& ]" ?2 W! q }
• University degree in the field of computer science or other appropriate discipline;
6 R' _ L* r1 R: c! s• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
' a- e! X1 E: D) A/ b$ {$ T5 J• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; / T5 _! @% Y6 P. M3 \
• Excellent verbal & written business and technical communication skills; # V; m" L D, i/ j
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
4 P, s/ q S5 u6 N8 `
5 t6 ^4 B# o) r) `6 ^) N1 E' v4 q5 nThe following experience would be considered a strong asset:
3 ~' r% ~" Z5 ~# x0 U3 U, d• Multi-tier computing architectures and middleware technologies; 7 H, ?5 P: x. A* L" x
• Web-based and 3rd party access authentication mechanisms; 3 H6 I5 F5 K9 O& Z+ M
• Demonstrated technical and security solution leadership;
7 [* P7 F" a% `' x
4 i' |" `! H7 J0 TEducation Accreditation, Certificates and Licenses:
4 w' c* }% |, C/ V• Possess or be working towards a CISM, CISSP or CCSP certification. |
|