 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
% E* ~# N G8 j( q4 iJob Title: IT - Security Architect 4 F+ x0 r8 \ ^" W- |! F1 v
Posted Date: 10/22/2009 ) N2 g, u( s1 F; K$ Z$ v
Department: IT-Admin
' J8 G& M/ H0 B; h# NClosing Date: 11/05/2009
( h6 J. ?6 Q/ {# J2 P4 }Location: Calgary
+ s i4 w9 `, O- |) g* i2 _5 YFull/Part Time: Full-Time
- m- Y) d3 l3 A i& XRegular/Temporary: Regular ' Z# A+ }5 ?( [, s* `
* E& f7 q7 _# Y* m
Job Duties / Responsibilities
! K F8 k. i; i8 W# v• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
# d# ?: r9 i5 W• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
7 L- I# g- w* w8 C8 @ m: {6 a• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 1 n* J; T9 s7 e7 |$ }' S
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; , d( a5 i v& a P: \
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
9 I. L: \# r. g' K: T$ {$ e• Share best practice opportunities and provide an industry experience perspective;
" W7 M" v. y# V7 E/ W4 ~0 L• Support and participate in SOX 404 compliance and Audit review activities.
! l6 r* I: W8 Y8 y8 ?8 E- s2 ^0 q' d$ l
: n% _* e1 |6 W uEducation / Experience% w0 v1 }7 `8 R# Y/ A4 @* Z% i
• University degree in the field of computer science or other appropriate discipline; 4 h) |! l3 c. T
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
0 B1 l. k% }" K; d3 T• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; . A) ^0 r; j9 @+ I+ R2 ~: c
• Excellent verbal & written business and technical communication skills;
+ ?- c6 A$ m) q# q' _. d$ z: l1 @• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ' s3 p, k& k( u2 ]% a* w% U
5 [ s }' }. _( z
The following experience would be considered a strong asset:
( @+ O G! E7 d% b# ^6 w. d• Multi-tier computing architectures and middleware technologies;
# b! _7 _# }) i' C% ]0 K( M, r• Web-based and 3rd party access authentication mechanisms; ! `7 P- n" [1 B# R! D
• Demonstrated technical and security solution leadership; : k$ G4 G! i2 P1 R- ?$ s
$ U2 c4 E8 d* jEducation Accreditation, Certificates and Licenses: 0 M9 X3 x# O* W" s& a/ X
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|