 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 4 ?' }- H, T$ @* F9 Q$ v6 ~- q1 ~, M" i
Job Title: IT - Security Architect
! A8 |3 Y6 u( p1 ^$ E3 _4 s5 L5 |Posted Date: 10/22/2009
7 P* X x+ {+ R4 p( ^0 f2 v: ~Department: IT-Admin
# k( [: ^( B3 h" ? t; aClosing Date: 11/05/2009 * {& n( P& w) A% `, h; ]! C) r
Location: Calgary
! m; Z/ G: P( {6 ZFull/Part Time: Full-Time # N2 [% N& H1 N- x0 B, T
Regular/Temporary: Regular
- k. N( `3 X; w- R) x; K
F3 o& A9 E) [# X2 ^* RJob Duties / Responsibilities* P( _7 d; d, k* b: Y$ V
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 8 @2 W, D! U! b: ~" P8 w: G
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
H& z9 Q( S; s9 i) _! C• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
& b+ I8 P6 q" J• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
4 n; G+ l2 K% Y; \, T• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
3 l0 j7 B$ d; P! }# V' @• Share best practice opportunities and provide an industry experience perspective; S" R% g. ? O# W2 f
• Support and participate in SOX 404 compliance and Audit review activities.7 ^$ v8 t8 y, H
7 o, e: f/ n$ `, ~$ L+ z4 q% ?2 T1 j; `# V
Education / Experience$ K6 U) M6 C9 _0 M4 f& \
• University degree in the field of computer science or other appropriate discipline; 0 {5 ^5 ~9 V7 r: u- [) r3 W+ @0 ~% N
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
( o2 B# x% s4 ^' a• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
1 |8 j5 ^9 G6 P/ F2 M* [- T• Excellent verbal & written business and technical communication skills;
( A$ r& q* R, [( S3 e• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, ] H9 Z2 g J3 e" ^# J4 a
9 k% P; ], f$ JThe following experience would be considered a strong asset: x" Z2 |; T: ?8 J, L R2 d
• Multi-tier computing architectures and middleware technologies; . a8 J3 z$ f! n2 h8 D; [
• Web-based and 3rd party access authentication mechanisms; * O$ R& x3 l$ ~: w
• Demonstrated technical and security solution leadership;
! G" _' o6 } v. m8 \2 A
5 V0 W! R5 q7 l3 y& Y3 BEducation Accreditation, Certificates and Licenses: ; U4 v* D/ o# H5 w) `- k. L" Y
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|