 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
3 s5 L+ L" e$ v1 S3 X# K1 [8 BJob Title: IT - Security Architect % Z9 ]8 x7 E& e& J b$ X5 s
Posted Date: 10/22/2009 $ Z& h- X; d: x4 r
Department: IT-Admin
8 d! Z% t& b xClosing Date: 11/05/2009 + w" i/ ?: @5 [- ?9 a, m, q
Location: Calgary * M4 c; r/ W) ~) s0 t0 k
Full/Part Time: Full-Time
( D, ?7 a, q0 k6 W; ?% C0 YRegular/Temporary: Regular
/ n4 Z2 z2 V1 u# a! Q4 g! W8 i& P2 H9 u& p1 c
Job Duties / Responsibilities# f' v3 u2 M2 X
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
3 h' b9 D% k3 Q: @) y/ u# a• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 4 X- c" [; m: K3 Y7 X$ C
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ f* `1 `: U" y) q4 z: U% M• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
# V9 p1 M5 M8 }1 x; }' V• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 6 l$ ?$ Q+ v5 ` b* \0 k6 H
• Share best practice opportunities and provide an industry experience perspective;
8 Z& a2 k# G( s, \: V* Z• Support and participate in SOX 404 compliance and Audit review activities.% X9 W& u. @) y. Y1 m- g! t
) w: B7 N, _! b5 Y/ G- i8 x% p7 @" H1 v/ e6 y/ O' U
Education / Experience' o2 j% V) g) m, j% U5 s; ?
• University degree in the field of computer science or other appropriate discipline;
3 t( O- D& Q8 ^% p6 z+ _1 U( H/ i* z• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
) J" Y$ \2 K6 g0 C: K• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
# w! j& ~- ^% h/ K! M• Excellent verbal & written business and technical communication skills; " x6 K7 [4 v6 [, D+ u
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. + O. V9 C4 c: ]7 B* E. d K
6 e1 T9 ~1 [ Q
The following experience would be considered a strong asset:
$ X* n, C3 [: r+ f/ A8 H! A• Multi-tier computing architectures and middleware technologies; + d$ y) w, Q/ p% n
• Web-based and 3rd party access authentication mechanisms; $ q5 @& f% B* f' W. j# u e
• Demonstrated technical and security solution leadership;
' b. X8 W ?; ^! u& ?$ h6 q# T) o, R3 z4 ?6 C/ @
Education Accreditation, Certificates and Licenses:
& [4 z& [9 V* Y$ M0 E• Possess or be working towards a CISM, CISSP or CCSP certification. |
|