 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
t, q8 [2 W# P8 c% mJob Title: IT - Security Architect
, S o1 F F- c& A" ?3 G0 FPosted Date: 10/22/2009
9 C# ]' t8 S) ]0 B y* }8 d* kDepartment: IT-Admin
2 N* B' E3 Y! ]3 V/ cClosing Date: 11/05/2009 9 u0 y) |2 H! p2 a& n3 |+ U( a. P1 G
Location: Calgary
4 F) L% w$ a3 Q. |Full/Part Time: Full-Time & D- ^, {' ^% p
Regular/Temporary: Regular * k3 d2 Y, _( H9 |5 M$ l7 q% Q
! t' v( y- m% Z7 ?
Job Duties / Responsibilities
; c% ?% b" T0 P! I4 L• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
& b2 r5 P1 X& o$ O, C• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 6 W+ h* ~2 I& x# U3 Q" H
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
0 {$ b8 Z6 W/ u8 f( m5 }• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ( W( k! R0 x. f& x- A9 U& Q
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # L6 g: ]7 K+ q) }! g) L
• Share best practice opportunities and provide an industry experience perspective;
+ |& u$ N4 H& |6 |' J4 R• Support and participate in SOX 404 compliance and Audit review activities.1 g2 O5 N. |, x8 }
9 f* s1 V1 Y* Y: _) N- H' L& S$ j* ~/ L, f2 V! Y1 Z
Education / Experience% H& v7 U: p8 g$ ]+ Q S. p" ]
• University degree in the field of computer science or other appropriate discipline; 5 r# p& }2 Y. k ^; e5 t& H1 U% ^ {+ q
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ' L+ ?! W6 g" J# j, ?
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; / X6 s! B5 M: U$ e" ~9 u' V9 K( C
• Excellent verbal & written business and technical communication skills; 2 B% Y2 a, l3 h: K) Q6 t# }
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. $ R8 r& g+ \/ N5 q# k
" H P2 y# z$ d/ d2 J6 O
The following experience would be considered a strong asset:
6 v9 z0 Q0 D/ I8 {* {. V• Multi-tier computing architectures and middleware technologies;
$ |# `; i. F; F% F• Web-based and 3rd party access authentication mechanisms; 4 M' C! X7 p( w$ n
• Demonstrated technical and security solution leadership; ( _( \% i8 P# k% y, Q/ o5 S' P, i
; g; H. p0 `8 j u) a5 ^: ?" J: j
Education Accreditation, Certificates and Licenses: + }8 x2 \/ W/ D6 u
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|