 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
A# E- z* o: j' u; }# w- bJob Title: IT - Security Architect
# u& J$ ~# g0 ^& v' ]! R( SPosted Date: 10/22/2009 0 \, v1 w* d( m& c' }, _% o P
Department: IT-Admin ) B; |+ P/ ~- i% n4 }. I7 r
Closing Date: 11/05/2009
* l2 ?6 F+ F9 }Location: Calgary
' p) H# X& L. |* n" hFull/Part Time: Full-Time
+ B6 J: L, Z( O! @* o1 }Regular/Temporary: Regular
h$ X! \* M9 N3 a' d1 X T2 t9 f' ? K
1 u4 q6 ~9 ~" k" V9 T9 a4 PJob Duties / Responsibilities. [: x+ E" |8 {8 i
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; % E, P! ~; w1 o% X: N
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; - h$ C' N1 ~8 _; Z
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ _$ m/ S; V/ r0 {$ d2 p
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
! h K A, @/ J3 c( ~' @• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
|( C. [* U, c• Share best practice opportunities and provide an industry experience perspective;
; M8 O' ]$ D7 H! W* ]• Support and participate in SOX 404 compliance and Audit review activities.8 Y8 X p- p3 V% G* L
; u) \# W7 N' R, X) q, R5 Y3 y6 x2 t
Education / Experience/ v8 p" | u* d
• University degree in the field of computer science or other appropriate discipline;
& ?/ L7 t/ ^3 w) F2 T4 |/ l& C% R' f• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
3 G. Q$ P) S3 S; n4 K! f1 X" i• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; - W7 f1 J4 G& D
• Excellent verbal & written business and technical communication skills; 9 C$ }. }1 [9 } @9 F% d9 H) J
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
* a0 @4 N# p4 e
, I$ I0 g) x" a0 f% EThe following experience would be considered a strong asset:
6 n7 ^9 [! ^3 X. S! K• Multi-tier computing architectures and middleware technologies;
, i1 k% Q, Y4 Q1 F+ A; [5 _• Web-based and 3rd party access authentication mechanisms; : m4 g( P5 Q2 n5 {1 N' ?9 U
• Demonstrated technical and security solution leadership;
0 L7 S+ u3 d4 T6 E3 Z
9 a* d7 S" W# L5 D2 b' u- xEducation Accreditation, Certificates and Licenses: ; K( I; `5 t2 t" t) a
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|