 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 2 K/ J6 Y/ h" T, p( F( z' a
Job Title: IT - Security Architect - R. _/ R4 I4 K) @2 T- U* z4 ?
Posted Date: 10/22/2009
% y/ |3 A1 p0 x. J) v Z: sDepartment: IT-Admin
9 k; E& U6 x9 f2 pClosing Date: 11/05/2009 ' L8 F- x* U/ G% V, |) T
Location: Calgary
/ [) S% u3 k; S0 V0 \; [Full/Part Time: Full-Time
9 f$ @5 E$ M& w! Y d" yRegular/Temporary: Regular 3 i2 F8 k# Y( _0 b; V+ {
' h/ Z [& h: _Job Duties / Responsibilities
: s. [" u. t% n3 V+ l• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
0 }' [ P; d5 c) B0 a• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
2 S, K# D9 D" L# p1 d) x• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
0 e# r( {# [3 V2 f• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
7 s( w6 \0 q0 S" Z3 @; w• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; : U8 ~" n: g/ N$ j" Y% O; f
• Share best practice opportunities and provide an industry experience perspective;
" [" @! m, }8 p/ M) V* m6 h$ |• Support and participate in SOX 404 compliance and Audit review activities.( V' `5 ]& ?" y
5 z5 P( P3 S1 y! }6 j& {" k3 w' D' h& C) B( `
Education / Experience
' _6 w* a8 ~$ R4 f, S& I& Z7 X• University degree in the field of computer science or other appropriate discipline; - J! D5 Y- P8 o* s5 o% z
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
0 b1 v$ @$ V; ?4 M+ @% G; T• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; + N+ m" j. D# H4 ~: k! v4 V* F
• Excellent verbal & written business and technical communication skills; ) [. c0 C( Q. n5 I O3 M: ^
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
% B p6 }) h; g1 m$ K
! a6 F$ _0 j' u+ LThe following experience would be considered a strong asset:
9 i+ Q' m& W0 ]8 H' k0 U$ h• Multi-tier computing architectures and middleware technologies;
4 p9 \2 g* R! }4 q0 N+ C" ]• Web-based and 3rd party access authentication mechanisms;
: @6 U# }/ J" z. h4 i" }• Demonstrated technical and security solution leadership;
8 l" f5 u" n* W( ]; M
7 {+ Q8 P9 P8 A' LEducation Accreditation, Certificates and Licenses:
- J9 F! C3 Y I7 P5 a• Possess or be working towards a CISM, CISSP or CCSP certification. |
|