 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ; w4 U# T9 L" l6 T6 s/ V
Job Title: IT - Security Architect & I5 m- L& y) ?' H4 N$ e' `7 v+ P
Posted Date: 10/22/2009 8 s5 w1 D8 S' v; Q& e# \+ E5 H
Department: IT-Admin
8 U* y, R/ `* `: {, _9 j& }Closing Date: 11/05/2009
4 B8 ?* @* v$ H7 t4 c BLocation: Calgary / T7 x6 Y) Y- E3 S" Y/ ^
Full/Part Time: Full-Time
( E- k* u" k- R7 nRegular/Temporary: Regular
' @. ~- O% _4 o3 T) C% G* h! B, q
Job Duties / Responsibilities
' E1 U" k' c, ], `3 b• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
" Z" A( |' I. v! Z, y• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; . u0 i1 F- `* S$ }6 q4 n
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ W& e, T' U- k. ?/ S
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : k2 o o; l: H$ o9 M1 N7 V
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ C2 K ~& G6 M) Y" N- w• Share best practice opportunities and provide an industry experience perspective; 3 P4 ~! Y" y' L2 K2 v. {4 @- E: ]" t
• Support and participate in SOX 404 compliance and Audit review activities.% |+ c8 T! U3 f O5 ^! S7 N
* E' o. j; Q/ Q' _. ]3 v+ R" A
8 p8 C5 d0 y) Z6 \3 HEducation / Experience
' W/ a! D# U% `# M+ ?• University degree in the field of computer science or other appropriate discipline; 2 S& R% i# l# \# v- s
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
8 m! g4 X: J+ J W9 R9 g' Y• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
5 w9 Y/ \% B1 M• Excellent verbal & written business and technical communication skills;
3 C' P( \$ v& J9 N8 C/ {• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
1 A" n' E5 [, g8 ~: j. ]/ C$ F' \* b, {! m4 S/ Y4 v
The following experience would be considered a strong asset:
. `2 ?( w' \% u, ?2 d# r, E• Multi-tier computing architectures and middleware technologies;
& ^0 {* ?* W. w, T• Web-based and 3rd party access authentication mechanisms; 5 ~9 f+ y% C w* }/ k# q- B
• Demonstrated technical and security solution leadership;
8 W( j' v7 y& A" h7 T# w# u+ M, H0 W. I& q9 c% q2 v8 ]
Education Accreditation, Certificates and Licenses: . G( D2 B' L X
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|