 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
- ?, G2 N6 y1 h8 z" L1 \$ HJob Title: IT - Security Architect " L6 b P8 d5 w& y! W: H* \8 b9 V
Posted Date: 10/22/2009 ) X6 U9 Q. G4 `2 d& x3 X
Department: IT-Admin 9 k' r$ Y* [8 A$ X' s
Closing Date: 11/05/2009
2 w F% W) f5 L( tLocation: Calgary 4 \4 G7 E4 f" X, k9 L
Full/Part Time: Full-Time
9 k( k5 Z; x) j( z) [. h% zRegular/Temporary: Regular
G" _0 ?6 `4 H1 p9 g9 }6 b3 R
Job Duties / Responsibilities
* ^. b" X- T. ~# j% r• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; $ B" b7 r# _ V) I1 U( Z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ! p! N, f% f D$ i0 j; ], b
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 0 W5 I2 _% V0 A% o# i9 r9 @/ H
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
d& I. k) B3 n- o* m7 m' Y0 z7 g; h3 O• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
* q0 D, g$ s. @0 d• Share best practice opportunities and provide an industry experience perspective;
3 |* h6 D1 }/ E7 O* v4 B• Support and participate in SOX 404 compliance and Audit review activities.6 {5 {" Z% ~6 a2 x. F
1 M: u0 p/ R, G8 e. Z$ w2 M4 ]* @7 x3 p* I- U1 W1 r6 ~
Education / Experience" R' W; h9 ^% M/ g
• University degree in the field of computer science or other appropriate discipline; 5 I* x0 f5 j! ]9 Y+ B, o+ M' o; F. a
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; $ x( o0 K V7 ^2 V
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 5 ^! u8 ~: b% n8 z. U6 s
• Excellent verbal & written business and technical communication skills;
8 `7 g$ h* L3 }5 @. r7 b+ K+ z6 F' |• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, P* F& [- \5 E0 R6 R5 X
0 C. a8 B, N" p0 oThe following experience would be considered a strong asset: U; i8 p8 s) v& J9 [8 Q6 w8 `
• Multi-tier computing architectures and middleware technologies; 2 y T# C" O2 ] {% K7 J! [( q
• Web-based and 3rd party access authentication mechanisms; / u% _. N0 H3 z' {+ M
• Demonstrated technical and security solution leadership;
3 U( ?! f1 \4 I& {. a/ i q% R8 L1 R4 e8 w- L8 P2 v
Education Accreditation, Certificates and Licenses:
& U! ~, i: w6 v5 k• Possess or be working towards a CISM, CISSP or CCSP certification. |
|