 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
: G [8 A9 x# gJob Title: IT - Security Architect
7 ?7 ? s0 F7 J1 u) Z. I6 N- APosted Date: 10/22/2009
6 g, f2 f2 Z2 |" ?Department: IT-Admin
% E, A" Y! E2 M. ^/ p1 m9 V* oClosing Date: 11/05/2009 " h3 _# J4 D" h2 J# D; F$ q1 x
Location: Calgary / [5 m) s. @" q: C+ K1 c( d5 U
Full/Part Time: Full-Time 3 E' V& Y4 ?8 ~' R, P- ?: A1 _4 m
Regular/Temporary: Regular 3 ?5 }$ Q# D6 w, x4 Y: p
. @% u0 ]7 @$ p2 }Job Duties / Responsibilities
/ v. Y, e1 S' P4 C" k1 x• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
0 j/ a& M- u7 i2 `& s• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
N& Z; {5 W0 V• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 9 p& O" m# X% y" R; B. ]
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; r- h( e0 B- W8 y( ?6 ~2 W
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
1 h0 o; H0 T: q* o$ R# d \• Share best practice opportunities and provide an industry experience perspective; % y7 F7 @ T, Q1 M
• Support and participate in SOX 404 compliance and Audit review activities.
, c7 @3 _) f# q- J. Q& e k$ Z4 R7 D+ G! \# {
' t- Y+ X# W* d4 ^8 D6 mEducation / Experience+ g2 v% p% d' y0 x5 T3 l
• University degree in the field of computer science or other appropriate discipline; 9 q( o3 `& G3 _9 h. n1 f
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 7 L% t# h% P& N! J3 M
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 F, `. w% j7 Y8 D" {4 h• Excellent verbal & written business and technical communication skills; , j n4 p4 ^4 B- R2 ~% a8 N$ n9 e
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. * B0 v4 ]( c7 Z" V4 D
0 H, P" r9 s1 O0 V0 I
The following experience would be considered a strong asset:
& P: ]+ Q" K; \- A• Multi-tier computing architectures and middleware technologies;
G! @ X0 Z9 q• Web-based and 3rd party access authentication mechanisms;
, k/ G5 y2 g- x9 y1 F' Y5 o7 L1 i• Demonstrated technical and security solution leadership;
$ p6 ?" H( h/ h) d' u* o7 m% q: H$ a% r; [# m
Education Accreditation, Certificates and Licenses:
1 W, [$ o( z/ u3 u2 Q0 A/ V• Possess or be working towards a CISM, CISSP or CCSP certification. |
|