 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 v: |9 w: t% m9 S5 lJob Title: IT - Security Architect % L& Y" S# t& c3 {7 q
Posted Date: 10/22/2009 % Y4 x3 E& i8 R; ^- _' U8 u1 C% x0 H2 e
Department: IT-Admin
. A: g0 p. I) V; FClosing Date: 11/05/2009 2 K- D o' H+ Y6 ~ \, c! R! D
Location: Calgary
( S- y+ K& O1 U# I6 Z. W+ TFull/Part Time: Full-Time
% I1 f. _1 C* a1 }8 ]Regular/Temporary: Regular
' x3 M- @3 G3 S& Q: b8 d b0 ~5 U8 A. u0 M0 B! s h( C
Job Duties / Responsibilities) q- q; f) v/ h. S2 U
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
- f4 ^6 M7 w w" e+ V0 M4 S- l• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; # H$ Z) Z5 b7 [$ P$ H8 P
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ H& j. q' w- l2 s* \$ d, Z
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; # G8 [3 F% O; O. s
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 3 X! |& w/ @" w* o2 J2 a
• Share best practice opportunities and provide an industry experience perspective; 7 v- N7 S% g2 i) W
• Support and participate in SOX 404 compliance and Audit review activities.
6 ]1 g% r) h- w7 H0 f$ c7 q# f. b5 S1 g' g
9 x$ |" Z% T4 Y$ x6 {* ZEducation / Experience
- D1 T2 h K; R" X+ j• University degree in the field of computer science or other appropriate discipline; ) y9 y4 g4 W4 p) @
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; . N/ [& f# f; A5 y
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
/ A3 T7 W" f# l: d. F( {4 w Q• Excellent verbal & written business and technical communication skills;
& q( O1 J/ @" F• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. : h" w/ {2 U: R3 I+ J: P4 }9 K
) F4 r- y% o9 L! M4 t$ xThe following experience would be considered a strong asset: 6 i( ]) G$ s$ d' V7 l" ?
• Multi-tier computing architectures and middleware technologies; 1 |2 s U& u `7 x9 `5 @1 m. Y4 g/ R
• Web-based and 3rd party access authentication mechanisms; % q, z) A t9 ?! Y
• Demonstrated technical and security solution leadership; 9 M& t% ?+ K: c; M/ j% S3 h
: ^- v6 F2 B" ~% ~7 s u& o
Education Accreditation, Certificates and Licenses:
6 q% m3 X# Y4 G* c• Possess or be working towards a CISM, CISSP or CCSP certification. |
|