 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
' n- j3 S( o" {0 S/ [4 CJob Title: IT - Security Architect 5 t* [3 Q+ Q& O1 A$ n4 Q
Posted Date: 10/22/2009
% g4 z8 m5 O# ?; r2 L4 C! a- W' ODepartment: IT-Admin + m! g5 o" Z1 W
Closing Date: 11/05/2009 / T- W! ]1 T; G, J' i
Location: Calgary
$ b6 G* I p; V2 I h- oFull/Part Time: Full-Time
0 @5 L$ y* ~, V6 u+ ]Regular/Temporary: Regular $ N; ~: a9 i; [0 ~5 h- q
$ M* y. r- c k. F) f9 T
Job Duties / Responsibilities2 e& \% X* W2 ~
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 Z3 o" v" f7 m- }$ I9 z: b
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
7 \5 g5 L( C0 i+ K: s• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; # z# X& E0 @2 |$ A5 T, N/ M
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 9 _0 b- u4 v' G; A2 X f! H' H! k' B
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
6 K* {8 H; B! p1 S" f8 {• Share best practice opportunities and provide an industry experience perspective;
" `- x: J, x" O! S& i& X- ]2 W8 `• Support and participate in SOX 404 compliance and Audit review activities.6 ]' _) f0 f$ L- T2 L; l3 @
4 v) e$ `" L Z
* _' n% S! U" rEducation / Experience
% h& j! \! E( o5 H' `6 {! H7 m; h1 j• University degree in the field of computer science or other appropriate discipline;
% d/ ~! E/ @/ p" w @" i1 J2 ]! u1 K• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
?& s0 p1 j. B; b* p/ ~• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
, C0 I! q& F3 ^3 e& O) ]• Excellent verbal & written business and technical communication skills; 5 J7 A: m9 ?4 i3 E% D" O
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ; V- E1 Y+ M" O. o6 B
, o# Y) \! D( l3 qThe following experience would be considered a strong asset:
6 V7 s* O2 s- e! z# ^% U$ ?• Multi-tier computing architectures and middleware technologies; ; z# L" r6 K+ J9 L
• Web-based and 3rd party access authentication mechanisms; + s" L/ T2 }- g2 c- }% D$ x4 v
• Demonstrated technical and security solution leadership; 6 F; h. e. p+ a2 `7 x1 m
" D+ Y% Q7 v# n, a. L* REducation Accreditation, Certificates and Licenses: & V c& z! X0 l0 ]& B" x
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|