 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
& ~$ Z7 X& C! y3 p AJob Title: IT - Security Architect
7 ^8 t4 ?0 j6 l5 X2 I+ @$ }+ j0 zPosted Date: 10/22/2009
I5 d9 ~ v8 z, y/ DDepartment: IT-Admin
, n& R7 y: v" [8 [0 M- FClosing Date: 11/05/2009
$ T1 x" @% |6 B# lLocation: Calgary $ Q4 h( h& C; @. E2 A* t; S
Full/Part Time: Full-Time
& o- j& G. r' L: f, LRegular/Temporary: Regular 4 c$ N' h9 q8 C8 T' B
- j8 s) O5 _1 N/ DJob Duties / Responsibilities
# ?2 c% k2 w' j• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
; P2 ]$ V" M. I. V• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 1 q! h9 b* s/ B* K1 Z
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; # _% g) M2 u5 ~! q9 Z
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ~" E! [4 A& q: ]+ k- X6 o
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ B0 q/ M$ j! Q8 d1 V1 G+ E, L• Share best practice opportunities and provide an industry experience perspective;
0 M Z6 m: ]& j( G. U• Support and participate in SOX 404 compliance and Audit review activities.0 N- { s6 ^% k; V G- b
' f5 i* f9 }7 _: |* E
& W: M$ p. ]6 L3 o6 Z5 xEducation / Experience5 j: d* Y1 j6 S
• University degree in the field of computer science or other appropriate discipline; * |. e9 ]! ^3 L H T& a
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; : g$ D& s$ s/ G$ p8 z& u
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
' @: F% U# K2 _" u! t4 a+ F• Excellent verbal & written business and technical communication skills; 4 D4 ]/ W% R7 C3 [
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
& ~$ d: s8 \2 l6 o/ t
1 f+ F9 I% u. ]7 b2 `: W; UThe following experience would be considered a strong asset: 1 @+ W0 q2 {2 |( M2 @
• Multi-tier computing architectures and middleware technologies;
9 q. w, C; O% [• Web-based and 3rd party access authentication mechanisms; 9 S7 ]$ `; N/ w6 z
• Demonstrated technical and security solution leadership;
% }: G# h% X+ I) {
3 u! V, q8 M& g1 C7 DEducation Accreditation, Certificates and Licenses:
. f$ M2 I( w) E0 a5 v+ Z- ^. U• Possess or be working towards a CISM, CISSP or CCSP certification. |
|