 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
' ?8 ^$ v" }) N8 V/ r) h; DJob Title: IT - Security Architect * v& @/ a: A R
Posted Date: 10/22/2009 7 Q& ]6 v5 \/ v6 w2 V
Department: IT-Admin 1 [. b8 }8 ~- w3 G j) g
Closing Date: 11/05/2009 / L K! U- r7 h+ g+ N: N% S/ e0 ?7 R
Location: Calgary 1 q, l5 R! c+ d, V
Full/Part Time: Full-Time ; h1 ~6 Q0 |" A! S. K. J% `
Regular/Temporary: Regular * v' M( C# h! {) s+ W) E
% e) `8 a& s4 b+ ?2 U @( h1 @0 c, j, z
Job Duties / Responsibilities. k6 x+ b3 c, ^2 O) e8 B& a
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 W3 z4 A6 y3 l4 i o4 k
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ) w, B( l! q2 I9 o2 H
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 6 N x4 R: C, W3 w4 }( H
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
9 F9 H; Z6 G0 q: R5 \. L% {• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ! r, O4 M, R- f8 b- D s
• Share best practice opportunities and provide an industry experience perspective;
9 u8 {2 y/ M) V9 o! l! [% `2 z# q• Support and participate in SOX 404 compliance and Audit review activities.% }4 b9 \8 I, H; o9 S; T
! T' Q2 u1 z' L7 v% U3 u: }" X
f; x2 k" @! J7 Z/ i! }; o
Education / Experience- g% A# |% o+ h
• University degree in the field of computer science or other appropriate discipline;
* {6 G: m. ?/ H! R) |2 c• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, { |% w8 u1 `4 [9 T2 r• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
, _: ?, B( w8 w: \" r6 h• Excellent verbal & written business and technical communication skills; 9 E: u* j) b4 t( o- H
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 8 Y! ~, f, L2 I
: U# |3 a) f, s# X+ R2 `0 UThe following experience would be considered a strong asset: 2 _! W$ K1 w" R( R3 B
• Multi-tier computing architectures and middleware technologies;
. ~2 Q0 D0 v; ^+ t. l. l0 I• Web-based and 3rd party access authentication mechanisms;
' k+ [3 u6 ^$ G6 ~1 J7 [% j+ Q• Demonstrated technical and security solution leadership;
" o+ ?( G$ Y N' f" V; `6 K8 x& b7 ^3 K7 V G6 {! s
Education Accreditation, Certificates and Licenses: 4 i- [4 K9 ^7 h! a
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|