 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ( r" V# c; k, V; L, W" f! ~+ Y$ S
Job Title: IT - Security Architect % a" s0 T- N# |7 \& q
Posted Date: 10/22/2009 % h: R" S2 y+ G1 e4 l5 r, v
Department: IT-Admin
6 _( I' n( O, B3 e/ W/ |Closing Date: 11/05/2009
6 r' j0 p# U" c; l8 a: ^Location: Calgary
3 y1 H4 Z0 y+ |* a! S% @5 V/ Z% L( RFull/Part Time: Full-Time
) `2 V, Y7 s! Y- m# b1 WRegular/Temporary: Regular " c* `( p" R0 x J8 s
2 |+ B2 E1 B) u
Job Duties / Responsibilities0 n/ G$ h5 i" Z4 c
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
: Z, G( ?6 n4 R# F2 \% c# k• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
* E- M6 l6 H3 x7 v$ }, \• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 8 e" O6 Z& c& w. M
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
: U9 \+ p* G& u% X3 k/ y• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; & x6 N. R5 ?' {2 @& ^* ?
• Share best practice opportunities and provide an industry experience perspective;
" ~! y: L$ E# a8 \5 V! W• Support and participate in SOX 404 compliance and Audit review activities.- Y' S2 {* D# H+ c4 {
! G* g, \6 S6 G! z% R) K% R0 U
% i# l/ i* k1 dEducation / Experience( D0 D6 `* g, X
• University degree in the field of computer science or other appropriate discipline; 9 g/ p" h) r$ \4 E/ ]2 W; r
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ( H5 S4 l9 ?! _! Z @7 ~6 y
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
* i8 U' \) L0 Q$ I% A8 L9 s5 U( R6 A5 P• Excellent verbal & written business and technical communication skills;
/ s* h* h& C7 X( k0 ]" I; \! R• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 3 F2 M& `+ E: c
# Y a j3 m4 L( v
The following experience would be considered a strong asset: ! F+ Z; w2 p7 u" v
• Multi-tier computing architectures and middleware technologies;
! [! f7 f9 u0 [6 x: o7 Q& o" T- Y5 v• Web-based and 3rd party access authentication mechanisms;
! L+ e0 [6 h, ]• Demonstrated technical and security solution leadership;
2 P+ Z, _ V6 Z+ g
+ }2 X8 `2 g" P# E1 LEducation Accreditation, Certificates and Licenses:
5 R( Z* j4 R0 O; P" u• Possess or be working towards a CISM, CISSP or CCSP certification. |
|