 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ; {4 r* Z) A) R. N( g) W# w [/ S
Job Title: IT - Security Architect ( s: f" _; I4 w: }- R
Posted Date: 10/22/2009 a8 a+ I9 @; o/ G
Department: IT-Admin 0 b- S/ ~; z7 x
Closing Date: 11/05/2009
1 C! C3 F! F8 c$ x- W- V* [Location: Calgary
G3 X7 L* c- ^4 Z6 z$ r9 ]* N& e. bFull/Part Time: Full-Time J: Z. F( i- ?5 c% n* @! g7 B
Regular/Temporary: Regular
+ D( W' e5 v6 u% l1 }+ k$ @
/ R0 ^+ ?3 A( H- u3 Q* aJob Duties / Responsibilities/ g) H$ g# @7 k" {) [* s4 ]
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 8 t4 } i% e$ s
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
# q; \/ O# K; N. Z) J7 j. r( N• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
# I% N' n/ L& C3 v! ?% V' F• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
5 }" Y, k2 Y" M• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; , B8 b" A" a# y
• Share best practice opportunities and provide an industry experience perspective;
1 x, \- E+ J" f/ r5 U3 j1 L+ ~! {4 t• Support and participate in SOX 404 compliance and Audit review activities.& s( J2 f6 z8 o
L; [7 Q5 u# h7 f
8 l; f* u e4 r
Education / Experience& {+ K/ g9 m/ R& x: q
• University degree in the field of computer science or other appropriate discipline; ! Q1 U# q+ j6 ~* ^
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
7 z" Y; F# I: V( n3 Q8 M% a• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 Q- w3 f* g* z& y
• Excellent verbal & written business and technical communication skills;
* C* Y" ~; \8 q0 e- X& A2 X6 z6 C: u% A• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. N7 O( o, K; F" u
: e. L. t. V7 _( k' }The following experience would be considered a strong asset:
8 P- R# q( H0 K• Multi-tier computing architectures and middleware technologies; - }+ O3 r& z: U p2 s5 ~
• Web-based and 3rd party access authentication mechanisms; 7 i+ ]# [( K" d8 J. r; L
• Demonstrated technical and security solution leadership; ) j/ l# ?% u, ^/ _* @1 P
* [+ a% l5 e9 U' R9 b
Education Accreditation, Certificates and Licenses:
; r6 K1 P J/ ^4 {2 `5 R$ Z• Possess or be working towards a CISM, CISSP or CCSP certification. |
|