 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
; A8 _" G% J% b1 K0 b# T" o9 EJob Title: IT - Security Architect
% z1 H, U! H2 T4 X2 }Posted Date: 10/22/2009 7 Y' U2 K9 f0 {' O! j0 V: R" V R
Department: IT-Admin
$ j4 i, a2 b, {( K' hClosing Date: 11/05/2009
1 H1 [9 h0 {* G% t9 K0 }Location: Calgary : Q4 d* Z& X3 d) V& W! E9 f
Full/Part Time: Full-Time
4 L# L) p" B" M( O- }9 O* GRegular/Temporary: Regular 0 _& a; D; A R e" e
9 `& G# D0 y6 r
Job Duties / Responsibilities7 o. s2 D/ G& ^' u. T6 h+ Z
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
8 G" l1 K7 x0 D• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
( V5 f9 v/ m, m: p$ { h. R$ [& M3 n• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 1 q# [* w. C1 N7 Z
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ' n) k; _; E v. F/ q8 }" i) F
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # E" v! A+ C- A1 ]/ d+ q$ l, Z
• Share best practice opportunities and provide an industry experience perspective; $ ? R# ?3 l P2 F9 M6 u
• Support and participate in SOX 404 compliance and Audit review activities.
0 }/ _+ p7 ?! _1 Z* d4 ~/ {7 l. W6 r. E) z! n
' v' ^! S K L C7 U5 PEducation / Experience
: o% \; r1 T' [; c3 }9 d4 A• University degree in the field of computer science or other appropriate discipline; # R( c7 V1 {4 l4 ] Q
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
7 a( v6 Q- S, ~. ~# n5 a5 e8 Z M" X• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
; r3 n$ N, _+ `3 M• Excellent verbal & written business and technical communication skills;
5 C9 e" Y1 P) q0 i# N# `• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 0 ?5 B; U h9 M& R2 @7 E; t
) L2 F! I: P* q) ?& ?; h W
The following experience would be considered a strong asset:
6 Z" S+ v) m( d* z% z% p• Multi-tier computing architectures and middleware technologies; 2 q& Q$ q y- W
• Web-based and 3rd party access authentication mechanisms;
# _% u L, L. Y• Demonstrated technical and security solution leadership;
# l/ {" f& h/ X! P6 v6 Q5 ^
4 K9 Z% q! d+ j; p2 IEducation Accreditation, Certificates and Licenses: : N" l, q) j2 u) r- v3 K) B
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|