 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 7 Z% v7 j+ J) T6 I# M" {2 h0 B. P9 Y
Job Title: IT - Security Architect + z2 O' ^4 p5 X5 v: ~
Posted Date: 10/22/2009
# \& Y q# G3 E. m- iDepartment: IT-Admin 6 H, K0 [4 H0 {1 X- a; w& s
Closing Date: 11/05/2009
0 }1 }" z/ `4 }0 Y: ~/ Y' hLocation: Calgary
% q5 }* r T- q( H" O( SFull/Part Time: Full-Time $ d7 S+ c$ C& `
Regular/Temporary: Regular % t/ U, X E( G+ l0 M
# q$ P: M9 e6 V* d/ \
Job Duties / Responsibilities$ W; v7 |% U1 i/ n- }
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
! q- y) f1 f0 I7 S9 }2 ]. b• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
) v5 L0 c8 }5 B% l- S p• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
0 Y$ t/ W" E0 k# b, u2 K# T• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
1 \, z- c8 S9 i; z9 O; ~• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
5 e9 @5 w( Z# _3 w• Share best practice opportunities and provide an industry experience perspective; 5 G7 R6 m0 Z4 w2 q9 F; H
• Support and participate in SOX 404 compliance and Audit review activities.
5 Y! a0 o$ o* {* v
0 |# H* @* k- E7 i b# l3 X% ? m2 r& v& q4 j
Education / Experience+ p7 m5 j" U9 d! ~
• University degree in the field of computer science or other appropriate discipline;
' ]- \; j% H. y3 K• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
6 O; w+ C, _. p: ~ X4 @• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ' R& W7 ?5 k3 g) g6 j
• Excellent verbal & written business and technical communication skills; 6 ^' E: R' y; x: `& I
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ' S, c0 p# G" q1 u
9 t& ^% G# l: }2 b& M* }8 GThe following experience would be considered a strong asset:
* d8 `, y7 c$ b• Multi-tier computing architectures and middleware technologies;
9 d5 G- S% \% Q- u• Web-based and 3rd party access authentication mechanisms; 2 V. Z9 X3 V1 a8 w% Z
• Demonstrated technical and security solution leadership;
% r6 d+ ~1 p& r% c0 P; n& k
9 P% v4 V4 M( q% FEducation Accreditation, Certificates and Licenses:
) b$ k) W- z, R6 X! }• Possess or be working towards a CISM, CISSP or CCSP certification. |
|