 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ! U& i2 D# C) S6 G
Job Title: IT - Security Architect
2 q& Q/ W! g; V% aPosted Date: 10/22/2009
; b9 A) F4 P( f$ j$ |8 I1 ^4 RDepartment: IT-Admin
6 C% }! L. q$ O* C+ p: |, `Closing Date: 11/05/2009
' T) K# J4 N2 h8 eLocation: Calgary
7 A! M1 S# a) g' C3 g9 qFull/Part Time: Full-Time - d, ]( B7 n7 A5 D
Regular/Temporary: Regular
$ q# g: e O! M; K: s, F, o4 z7 w) i7 C( X
Job Duties / Responsibilities
/ j" c! q) f1 ^4 ^• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; - y$ N4 I' { K) L; G
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
4 J: `% e R3 {9 X+ _• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
# ]# @* B: `6 v+ X( A7 C• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
% E$ j7 h0 x9 D% j0 j! @6 ]" e• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
" |2 X: g2 K* M- @• Share best practice opportunities and provide an industry experience perspective; . j6 a1 {! p% q! u5 H5 {7 q
• Support and participate in SOX 404 compliance and Audit review activities.
3 K$ R5 }- p6 @( q7 X2 M
& A5 p, V7 i5 w# J
! `: X0 ?$ g& Q( Q# WEducation / Experience
5 M6 @; J$ Q% Y" X) p A• University degree in the field of computer science or other appropriate discipline; 9 N- o J: `/ Y8 N6 ~' }
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
0 \( z6 c% d0 x+ `/ y" d3 J' }• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
8 g+ }2 U- V- s$ \/ G• Excellent verbal & written business and technical communication skills; / F( G8 c& D* ]- a9 {: M
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
4 M3 h! w# u; m5 V( Z
4 r" I5 r( t2 sThe following experience would be considered a strong asset: ; p' \# ] L, M: e: a# X% e5 `
• Multi-tier computing architectures and middleware technologies; - e0 q9 w7 ?0 V
• Web-based and 3rd party access authentication mechanisms; 8 H% ?5 V+ |7 @* Z3 k. U, v
• Demonstrated technical and security solution leadership; ) c4 q" x! u, `$ D0 J
. ?1 c: y/ d7 p& QEducation Accreditation, Certificates and Licenses:
8 D6 }+ z! w- `$ `( Y• Possess or be working towards a CISM, CISSP or CCSP certification. |
|