 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
" _: Q+ Q: @+ V- z7 I4 w- TJob Title: IT - Security Architect 8 B3 S" W. c9 D' j
Posted Date: 10/22/2009 L% Y* D) ^9 J% k. h
Department: IT-Admin 1 o9 Z0 R) R2 P8 T L; p7 J& B; C8 p! h
Closing Date: 11/05/2009
$ }! ]/ U+ e5 G7 {Location: Calgary
[; }4 V# C$ S2 p7 k6 S" GFull/Part Time: Full-Time . s5 N* o6 a# X
Regular/Temporary: Regular
+ M( @# \3 A7 T" d
9 c8 {- S' T% _, [( K* Y& E* U# pJob Duties / Responsibilities" E5 ? D: ~8 B) }- D0 l/ a
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
4 O5 g! [6 B4 R* q• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ( U( k7 [7 t+ I& N; t
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
7 f- k" ^5 w2 R' {) x3 Q, x• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 6 t% x) s) t |) {
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 4 {2 P8 \( Q2 c
• Share best practice opportunities and provide an industry experience perspective; $ D5 V# e# e9 a' i1 v* T: o |# k9 b+ C
• Support and participate in SOX 404 compliance and Audit review activities.
2 O2 q; @% n, b( x) W& z
# n. Y" u8 L" S ^) q$ k
' U, a6 [; j0 ^" x* ?/ \% D+ pEducation / Experience) v1 W4 H* O7 \8 g
• University degree in the field of computer science or other appropriate discipline; # C Q; o6 P' V4 y& v
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
8 E" B3 Y; Q ]• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 4 [% h0 X2 H8 C+ j/ q2 t# ^+ _
• Excellent verbal & written business and technical communication skills;
- ? l9 |( k, l7 |' N6 ~1 I• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
8 Y' t; m) |9 Q- V8 e+ v! M- @! l7 B% R( x) [9 b( A6 V. x0 d( J, C
The following experience would be considered a strong asset:
7 J1 U0 R% l4 ]: n• Multi-tier computing architectures and middleware technologies;
: B5 ~4 s1 F6 G• Web-based and 3rd party access authentication mechanisms; ! v: G) p% P* k8 g/ p& |
• Demonstrated technical and security solution leadership;
3 A1 |4 t, S. s/ X7 U7 D4 u5 M3 i6 I' t/ {( _
Education Accreditation, Certificates and Licenses:
8 q; b* s4 Z$ l" J1 p2 C& X• Possess or be working towards a CISM, CISSP or CCSP certification. |
|