 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
: W6 }6 S& Y8 V9 ~5 l, ^9 m$ `" YJob Title: IT - Security Architect
& N$ F% t0 y. Q- y& FPosted Date: 10/22/2009 - a% K( M% {- v, {& _
Department: IT-Admin 5 G5 q: T! x4 N" C2 F! z
Closing Date: 11/05/2009 $ ~1 k( v) \% y+ r
Location: Calgary
0 Y% Y2 I; w# V0 o6 d/ G! UFull/Part Time: Full-Time
3 s8 _' s7 y% l: V6 VRegular/Temporary: Regular
6 u) |5 e5 P6 ?( D
$ }) X! E/ u# x( d' F! x! JJob Duties / Responsibilities! P* x8 k6 s+ Y! x
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ! G$ ]) ~, o- Y( ?
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
' s3 P1 w; @& s0 ~8 y6 Y/ a( }• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
. R1 h7 Q. J7 L' z' W! R• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : \* c0 U: ~. k1 s0 s% J* w
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; * H9 R+ P0 {/ K# Q4 E
• Share best practice opportunities and provide an industry experience perspective;
; W6 X- O6 f+ S/ n. p• Support and participate in SOX 404 compliance and Audit review activities.4 S, k& l `* o- { c
& J8 y9 d4 ^* D
8 r8 p1 [8 ?( a/ d
Education / Experience
$ z. ^: \/ I b* C• University degree in the field of computer science or other appropriate discipline;
! s$ K+ T' f5 n• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 6 z/ h. |" K8 p; t& W3 {
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
9 m: j2 `/ N# G$ C5 ?. m• Excellent verbal & written business and technical communication skills;
+ M2 Z3 I/ P& P* j. j• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. % P& _5 ?7 Z p* }, e$ f/ `6 F
, Z. [ {5 J7 k- U+ I. j, `
The following experience would be considered a strong asset:
9 y/ S9 H( c4 \" T+ i" \6 S• Multi-tier computing architectures and middleware technologies; 1 q( j9 @1 F7 H2 |5 R1 S
• Web-based and 3rd party access authentication mechanisms;
0 K1 Y) u* P3 l( l( I3 `( A' I$ ]" ~• Demonstrated technical and security solution leadership;
; j! [+ N0 F$ }$ F. w- |/ J7 x9 ?) a/ b( b# f: e6 x
Education Accreditation, Certificates and Licenses:
# Y" H+ P! `0 y& k7 H, C5 n- k• Possess or be working towards a CISM, CISSP or CCSP certification. |
|