 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 6 T3 T6 ]6 K$ z5 Z5 R
Job Title: IT - Security Architect . g. ]3 z$ W$ [0 `4 c9 U7 I
Posted Date: 10/22/2009
- ~& [- o# z. d% ?+ Q, v2 q# vDepartment: IT-Admin 9 r) ]. k* s% ~
Closing Date: 11/05/2009 8 J, E6 _/ A k7 {* `; d8 u
Location: Calgary . a) u5 ? H6 N% a' e. v7 ?
Full/Part Time: Full-Time
, l c) X* \- U _, hRegular/Temporary: Regular - B0 `+ [" T1 @5 ^) g9 x; C
: z3 c; u$ S( p, u. S8 W6 b0 \& H
Job Duties / Responsibilities) |- m$ P2 h& l& i& B
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
: _, o- J6 c6 a; K• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 0 c7 z) P2 M7 V6 B) z
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" u5 o7 n+ g* y4 b• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : h! o$ e$ B1 c2 y7 h7 i
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
: ]3 o3 Y0 e5 Y. _1 H6 D• Share best practice opportunities and provide an industry experience perspective; 2 L# z% i" |% ^3 Q
• Support and participate in SOX 404 compliance and Audit review activities.2 [/ Z7 ^- I5 Q5 x7 E* i
/ X- V; M" S) y& C& V- o9 ?# q" B) w: I( ]3 N
Education / Experience+ l4 e. S( c- p3 ~5 x6 I6 A% o {
• University degree in the field of computer science or other appropriate discipline;
' f" }% Q+ Y) M5 h/ _" ^* Q• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, F; n2 X. x3 I p: [9 Q' }3 S• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 D. ?9 D6 n- o2 ^
• Excellent verbal & written business and technical communication skills; 1 J3 F I! `" j
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
2 G' g. A5 }0 m; p; [# x4 L
/ a3 {) b- f1 K. t+ j8 AThe following experience would be considered a strong asset:
; S! E- p, x" l( j7 G: Y• Multi-tier computing architectures and middleware technologies;
1 w- |+ q; \- `' a9 F• Web-based and 3rd party access authentication mechanisms;
+ D3 A4 z. L2 ]" \• Demonstrated technical and security solution leadership;
" F. @ b b' ]. v: R
. e3 ]" a: M5 @( O! G& s' ?Education Accreditation, Certificates and Licenses:
$ Z3 {8 [/ p, K' w• Possess or be working towards a CISM, CISSP or CCSP certification. |
|