 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
* H" R y5 |0 |/ j( E GJob Title: IT - Security Architect 4 j# N/ C! B/ n- ^; `
Posted Date: 10/22/2009
2 {0 m- I5 C! e7 T# \8 xDepartment: IT-Admin
/ D8 B2 a% C2 S) ]3 TClosing Date: 11/05/2009 . k. S: b( a' W' A- u0 V6 \
Location: Calgary
$ {' r9 N- B1 a. M( F: cFull/Part Time: Full-Time 8 O. B, I% p1 L' H
Regular/Temporary: Regular
2 U$ V9 z$ u1 ^
* s7 C: N2 O2 G1 e- uJob Duties / Responsibilities9 p3 a8 A7 Z' d. C7 @3 f. W. `: u! j) \
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 2 @- d. r1 f3 \
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
+ r8 R3 y! r9 H+ H3 t/ w6 i, g• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
' e5 s: s; o/ T% r$ ?0 n2 i8 Y+ i3 U; D• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
- C+ M; X! d8 k/ {* c- Y• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; + N% ~9 V8 W) I) w6 u( E) }2 u% P
• Share best practice opportunities and provide an industry experience perspective;
8 m6 w( j0 @! i# b% |( t• Support and participate in SOX 404 compliance and Audit review activities.- r5 e% a5 T' a2 P* k6 s0 R
6 }( O5 ]* r Q5 i* Q5 k' {
$ U5 w M7 w* M
Education / Experience5 d/ o# W3 v/ J+ e* j- C
• University degree in the field of computer science or other appropriate discipline; 1 U1 n( t# ?+ R$ t, \2 m
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 1 Q. x: P" l- f$ }. Q1 |5 r6 [4 s) R
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
/ b2 e" F6 T# o, S# {# S) q* ]• Excellent verbal & written business and technical communication skills;
* I9 k% ]5 v0 s6 @• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ! A& s7 f+ g+ ?1 K7 B! i) \
5 Z4 @. t2 b' b1 Q
The following experience would be considered a strong asset:
. N9 w5 W2 l3 r8 Z0 m• Multi-tier computing architectures and middleware technologies;
& s. [3 T% X" v: c7 O; H4 R• Web-based and 3rd party access authentication mechanisms; " {; @ @$ G$ N0 q8 P( X, o1 i
• Demonstrated technical and security solution leadership;
* E& U0 [* e1 c/ n0 E
, U a2 r7 j, v/ U6 EEducation Accreditation, Certificates and Licenses:
7 ~; ^& B% c7 o0 I( f) R- i) M+ ]2 {• Possess or be working towards a CISM, CISSP or CCSP certification. |
|