 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
; a& i d; `) O' S! sJob Title: IT - Security Architect 8 R3 _9 }7 z) g
Posted Date: 10/22/2009 ) W8 C1 J& t; ]/ O; E
Department: IT-Admin ! W( M& D; J8 ?$ v7 F+ L6 ~! F
Closing Date: 11/05/2009
% ^5 K: Q. e' P1 aLocation: Calgary
# t/ T& l% S# r( MFull/Part Time: Full-Time
1 j' k0 x0 _, [- I% yRegular/Temporary: Regular 0 p2 m1 S) s9 N$ t3 U- Q+ Y
! ^- P* A: ?5 Q) R$ U# sJob Duties / Responsibilities1 C1 l' ?. r7 i* f; D. q6 h; g
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 6 b: c( |: ~& z4 g- H
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
' c6 ?$ R& m# O" j/ I* F u• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
& i% n+ S# v+ x1 \• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 2 A3 |1 ?3 G/ F, v2 ~
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ W3 M# q7 U* A$ e6 h& b# \* ^% ~• Share best practice opportunities and provide an industry experience perspective;
$ C/ b/ T1 b- L Z• Support and participate in SOX 404 compliance and Audit review activities.' u, e" Q) {2 v! t
0 Q* f4 { ] y2 k: U% w
/ j0 a t3 q+ ~8 j4 G) GEducation / Experience) g7 }1 ]* n7 s& \ T
• University degree in the field of computer science or other appropriate discipline; % x2 q- ?% h. X! s6 ^( g
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
6 v+ [* l. V! P7 v( W2 J) s• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
- d) [/ t9 A/ x! g! h• Excellent verbal & written business and technical communication skills;
4 @( h/ y3 s' _! K6 y$ o3 d• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 4 h% ?& }4 h! z+ y1 z/ ~- q
! ]- x* i {; j
The following experience would be considered a strong asset:
% e' f1 n+ a8 M; ]! f# Z• Multi-tier computing architectures and middleware technologies; . K9 `- k: e1 l7 c6 f7 r) ?
• Web-based and 3rd party access authentication mechanisms;
4 o' Y+ ~' m9 I; n. j" C• Demonstrated technical and security solution leadership;
1 [7 N' c7 w, c2 M& \4 n- e* U1 S( h7 {5 [% l, ]) x/ a
Education Accreditation, Certificates and Licenses:
( p( [8 Z- m+ ^- j! c• Possess or be working towards a CISM, CISSP or CCSP certification. |
|