 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 7 m6 `. J X& R% n4 D( v
Job Title: IT - Security Architect : `3 n* x3 e. V; c: Y8 O
Posted Date: 10/22/2009 * X6 w! @$ N' y% ]- u6 Y% C
Department: IT-Admin
7 x. L7 r2 ?- G- ]6 f' TClosing Date: 11/05/2009 ( ^# I6 \. a" f; h
Location: Calgary
$ q. T; p9 |, J5 ~- F. H; B2 KFull/Part Time: Full-Time
; a$ v8 [9 B5 w: bRegular/Temporary: Regular / m* U" ~/ `2 r. g
/ |4 a7 P4 b6 a, ]
Job Duties / Responsibilities( o) y( J# A! N. g
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ; g9 \1 G" @) J" }' `
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; $ E$ D9 h- {* G+ h
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
! v; U: W' v' D7 i* b# R3 m2 m• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
" {/ R A) a2 f$ ~; S& {• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
1 y- ^4 O* e( j. \3 j ?• Share best practice opportunities and provide an industry experience perspective; 2 r* |1 r6 _. l+ ]
• Support and participate in SOX 404 compliance and Audit review activities.
- |* F) H& t/ [) S
; \' \) j' {2 e' |: o7 M& A
2 Z ^" F) G. @) SEducation / Experience, ]8 b! f/ p. U# b8 T
• University degree in the field of computer science or other appropriate discipline;
3 P7 W5 P+ D2 _4 v9 p. A6 f) J" i• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; . H6 A! \9 {/ ?* |3 Z6 m" E
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 x0 \, i4 r1 g( E" v U) ?2 F
• Excellent verbal & written business and technical communication skills;
# f8 |3 k& u9 N# ~* B: I• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
" ?0 j6 Y- c- l0 k4 J4 K+ c5 a' N1 u
The following experience would be considered a strong asset:
7 g" Y7 c# P' n0 C5 L5 H& p• Multi-tier computing architectures and middleware technologies; & p' W% y5 M/ k- q+ _; X
• Web-based and 3rd party access authentication mechanisms; 8 z1 D( ^3 A! }! q) X" @
• Demonstrated technical and security solution leadership;
$ j# `$ G8 b% X7 r1 o
9 K4 q# f+ J' |2 V% _Education Accreditation, Certificates and Licenses: 8 T& i, ^$ G5 C% r5 M
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|