 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 R$ J' u. o s# R% [( T) R3 TJob Title: IT - Security Architect
* R7 q2 @$ h8 JPosted Date: 10/22/2009 , E2 n2 v+ M4 d% K" _& b/ @" ~ V
Department: IT-Admin
' z. c$ B+ z" D9 H% B7 ZClosing Date: 11/05/2009 ' }# F, F7 t; q' s
Location: Calgary
" c, U0 d# B; s0 k, @1 Q3 {+ tFull/Part Time: Full-Time
! q7 X4 \! I k+ }: k* G5 kRegular/Temporary: Regular ) g5 n; ^2 g/ a
, |& h9 T+ k" Y* G' [Job Duties / Responsibilities
0 s5 p& c" T3 h, }0 p• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
+ f# F7 D1 |% v! q$ I" u% t. [• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; + y9 R* h$ s/ r
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ) l, d/ e2 q" N9 ?- X( \
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
& b7 |1 P0 f3 P2 J/ x7 Z• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
& ?# t" h" t, s, E' C9 `: k• Share best practice opportunities and provide an industry experience perspective; % O1 o7 g1 R J& I! T* X
• Support and participate in SOX 404 compliance and Audit review activities.
4 B7 z1 ` L5 A6 a. ~' ]0 l0 r+ V& w
. b& c$ u6 R8 |1 P3 p" ^4 r3 }7 U' V$ P
Education / Experience$ @8 B+ h) N6 A
• University degree in the field of computer science or other appropriate discipline; ( x8 j- H4 q' M( ~; Q. n( H6 i. u2 B \
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; + }; a( r" _1 | w
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
0 L6 j- ?, Q- Q, W• Excellent verbal & written business and technical communication skills;
& J/ ?3 q' K# n# `• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
* k& l( s$ f) n: b$ B( _
& K h, [8 h' Q( g+ k, q2 AThe following experience would be considered a strong asset: , q2 c/ T) f! c. Z3 S) ]
• Multi-tier computing architectures and middleware technologies; 0 f5 E) \, @5 G
• Web-based and 3rd party access authentication mechanisms;
# T. H- Q N5 c4 e; ] |4 s! k• Demonstrated technical and security solution leadership; # z6 c3 @2 F/ J
# p. d) B5 r' N& t7 z2 m
Education Accreditation, Certificates and Licenses:
8 Q# K8 A7 @) B' P• Possess or be working towards a CISM, CISSP or CCSP certification. |
|