 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
0 ~3 v' a% ~: S dJob Title: IT - Security Architect
4 P0 Q2 D. |, z D' @2 {4 C _* NPosted Date: 10/22/2009 - _4 T, a% e1 A+ R6 w1 C
Department: IT-Admin
8 u, [9 U6 `% z' _: F4 v6 cClosing Date: 11/05/2009
' a1 g9 U0 g$ [2 p: HLocation: Calgary
7 z( T+ L: S; q8 m* GFull/Part Time: Full-Time
) T. z y X) o1 }6 ]Regular/Temporary: Regular
- s3 w( e# T2 S/ V# l9 F, s
( a# x) X8 { C. h* uJob Duties / Responsibilities
" a% T* U+ H4 M9 Q8 d! t' Z• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; # u' l7 x6 |9 E
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 1 h, k5 i6 I' V4 j+ }/ y! I
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ) N+ n+ F3 r! v+ b4 q( `$ c% R
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : j6 u3 z; {8 o+ F" H% G
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
0 P% O$ W0 g S1 ?0 r/ b5 v; F• Share best practice opportunities and provide an industry experience perspective; 0 @* H- P& \; K( R/ ^
• Support and participate in SOX 404 compliance and Audit review activities.
# ?) @% G8 ?3 `
, s) O: f$ J2 ?0 p4 B2 [! Q3 h" T& C. w# F4 e
Education / Experience9 L) M" |$ z5 l$ N4 b
• University degree in the field of computer science or other appropriate discipline;
! a. r2 X3 {% j% ~; T9 R• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 0 a' M0 ?# e! }6 S& d+ h1 }
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
: a6 e1 d% Z8 E. @" K$ `7 V4 ~• Excellent verbal & written business and technical communication skills; ' `0 e% w7 V- b
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. / S+ P8 G, U* E) ~$ f9 V5 k
1 w7 X2 C# X7 M$ }# UThe following experience would be considered a strong asset: - P8 [. X! F) L0 @
• Multi-tier computing architectures and middleware technologies;
+ o5 @" T5 W0 l- }6 X. M! ]• Web-based and 3rd party access authentication mechanisms; : x" f+ w9 D; H% O. s& K/ [! Y
• Demonstrated technical and security solution leadership; * s2 C7 c% L5 S4 W' c) l+ w4 M
o% i# L w% @# t# C0 P. R+ J- dEducation Accreditation, Certificates and Licenses:
, y& p" }6 Y. ]' V9 Q• Possess or be working towards a CISM, CISSP or CCSP certification. |
|