 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
+ b- D- b1 o; a9 dJob Title: IT - Security Architect 3 i$ k; ?/ {0 o5 S
Posted Date: 10/22/2009 & W" k4 {0 ]. C8 B) A
Department: IT-Admin
9 ?- U3 ?* b! iClosing Date: 11/05/2009
5 I5 |: F2 d) c) F3 I: h" z' [- U: L% ~1 ZLocation: Calgary ; l" t( J. Y% _! i% }
Full/Part Time: Full-Time * `: P9 o& L a
Regular/Temporary: Regular 2 m6 u+ G7 W) m' t7 R( T( l- O2 ~2 t
2 `9 F8 B0 ~( Y& g7 S# l& r F
Job Duties / Responsibilities
U3 H9 j$ W4 h- ]- _• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
5 E2 F0 q f: i" D, p j3 q• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ; u+ U* C4 i* e! g9 j5 k
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
5 H$ R4 ?2 M! o7 @) \• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; + c0 }9 U4 A) L3 I& f
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ m. [4 ~! j4 q b& I# a% u• Share best practice opportunities and provide an industry experience perspective; ; |4 s" @( {; J! c f
• Support and participate in SOX 404 compliance and Audit review activities.
3 I: _% Z- A( v! ^$ M* F" E2 Y, D1 p* u
0 N- P& Y1 `+ s5 e/ T6 kEducation / Experience& L, m+ N: y* X* D
• University degree in the field of computer science or other appropriate discipline; V4 M+ A. ^! x* V
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; $ `. Y' T8 l n/ _) z1 [- r% Z
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
( A0 K+ s( Y' T* M' I2 Y; t- W* ]• Excellent verbal & written business and technical communication skills; 4 H. `( u8 b( k* q% ?) m5 R1 t
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 2 a; s0 L! @# M. X, ?2 Z2 G! t7 A
& s a; {; U# O& U/ N S3 r0 AThe following experience would be considered a strong asset:
) z" N% y" L; o- [4 C. u* }• Multi-tier computing architectures and middleware technologies;
! x8 ^) k6 Q# U& U! v' u• Web-based and 3rd party access authentication mechanisms;
& x+ @4 ~; X0 ]• Demonstrated technical and security solution leadership;
B1 ?: c0 e6 ]+ y. W# E* S: r# t0 o: M- N* M. U n, K3 I
Education Accreditation, Certificates and Licenses:
0 q5 z. b, C+ Y0 L• Possess or be working towards a CISM, CISSP or CCSP certification. |
|