 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
- q4 v- j E, g) M# \Job Title: IT - Security Architect . |/ g O" T$ ~, i1 {7 R8 [
Posted Date: 10/22/2009
* ]) m" n; G8 pDepartment: IT-Admin q9 {- }$ m% e4 T6 O
Closing Date: 11/05/2009 6 C: K; s6 o2 n- W
Location: Calgary ) P, b( T: c+ u, G3 c) s& q
Full/Part Time: Full-Time ! h( l" G! B. l! w
Regular/Temporary: Regular + Z$ J1 ^9 S* V9 T
9 w. X+ v5 ?2 ]/ E2 H) x
Job Duties / Responsibilities
. y# f& X5 c+ F5 i [# i+ L2 w• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
9 [3 a+ B& Y5 W" f3 T [• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 4 b; f% _6 p& Z8 {
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
) s6 `, K5 h& Z: c; V• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
0 }$ v) H0 T5 O4 x q• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 1 ?3 a% q+ m0 \9 i6 p
• Share best practice opportunities and provide an industry experience perspective;
3 ~: Q" O, v u• Support and participate in SOX 404 compliance and Audit review activities.. @5 W6 v8 v$ {1 f$ n
& s7 d0 p# Y n7 ?$ |# _
0 U/ ^9 B8 d8 l+ v$ a- s
Education / Experience) T) a7 ^2 Q" f' D/ p& ^
• University degree in the field of computer science or other appropriate discipline;
/ A. B! v _, a- a0 Z! t• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; : T+ d0 g6 Y' V- c; d! u! F* O
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 4 c2 F+ t5 O3 S k' H
• Excellent verbal & written business and technical communication skills; % ?5 j# `3 D: o* n2 W- e# ~% H
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
! t% Y/ N0 l8 e6 Y. Z- H+ M" _5 ?5 x" ^; y9 Y
The following experience would be considered a strong asset:
, [: x. ?0 s6 R3 J6 j• Multi-tier computing architectures and middleware technologies;
' }+ B1 M$ r6 q7 M9 f0 S• Web-based and 3rd party access authentication mechanisms; ! B( ]# k) l7 l2 {# z" Y' b$ ?
• Demonstrated technical and security solution leadership; 0 O3 |! Q( C5 y: \. _, B
( R, A, M4 q" `4 @( v: [3 q) D0 D
Education Accreditation, Certificates and Licenses:
/ q' |9 J7 r# o9 R' T• Possess or be working towards a CISM, CISSP or CCSP certification. |
|