 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
+ v. T( `9 d/ K9 P0 EJob Title: IT - Security Architect ) F. A; ^6 p- a& \: d' I0 P. R: f
Posted Date: 10/22/2009 1 H$ a/ t3 q2 I2 ^0 N2 Y5 V
Department: IT-Admin
) r1 i! V! F, y3 }Closing Date: 11/05/2009
9 U- G' G B4 x0 _; NLocation: Calgary
: y, P0 R5 y/ W+ `2 o0 {7 vFull/Part Time: Full-Time 7 k0 z0 v+ `6 \! z4 g) E
Regular/Temporary: Regular
. u- M# F4 O ^2 `# w0 a* n6 j M" w0 ?2 R5 f
Job Duties / Responsibilities
/ K+ r) G, B% \4 p0 h9 o9 A• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
$ ^0 v! t: u8 N7 |• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; # b1 O: M) c) ~
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
+ _, ^3 _- w# ]6 E ^+ A* E• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
9 W3 i: `2 m( o• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 8 ~9 `3 K" U9 ^, d
• Share best practice opportunities and provide an industry experience perspective; ; X' H, |. O( F& b
• Support and participate in SOX 404 compliance and Audit review activities.
. K) D/ q8 m& J+ F; g7 f& |+ V8 q/ B- y& W3 G
! _! p9 ~& L7 [
Education / Experience
7 o8 f. w" D+ P( C; h. S9 _• University degree in the field of computer science or other appropriate discipline;
1 f3 G, ~, l9 Z: w o! |• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
/ h, i! Q4 W3 E8 } Q. d• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; % S& |) n& |2 p; l
• Excellent verbal & written business and technical communication skills; ' @; l0 l' b8 q+ Y' a+ W8 m
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ; ~( b) F) K& b- M6 v
3 X4 Y: e6 K2 H' Q( B
The following experience would be considered a strong asset: - s; p; l% y/ J; o
• Multi-tier computing architectures and middleware technologies;
2 Z5 F4 N9 a1 x8 @0 y4 O& ]• Web-based and 3rd party access authentication mechanisms;
! t& P6 C$ D5 {; f• Demonstrated technical and security solution leadership;
* ~. e) J5 l5 X1 [% }1 h. Z3 Z" v' C0 ]+ ?8 M
Education Accreditation, Certificates and Licenses: & _2 m# O6 @3 D1 }0 j1 U
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|