 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
9 s7 Q: J# |* g* ?1 d3 S/ f* P* BJob Title: IT - Security Architect 7 s" E. ^" \4 t* j
Posted Date: 10/22/2009 ! O* K0 l, [% r& ], `" I& A$ D4 b5 V
Department: IT-Admin % T( q6 f# \ R( K3 W" ^0 k
Closing Date: 11/05/2009 3 S* y8 s' v2 z# O
Location: Calgary ( X+ R7 N% e* I$ I8 A
Full/Part Time: Full-Time
7 y; J1 v4 T" e9 ?# M+ CRegular/Temporary: Regular 6 A7 J' z: |0 h$ E9 ^+ K' L; L) x
( b2 x4 r4 R; E9 t/ iJob Duties / Responsibilities
" E% X/ \. \ @, C/ R4 |• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
1 Q0 J/ v% S- H. K• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
$ d& [- Y% t" y4 ^# I8 Q- z• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; & W& M) i9 n/ l, i/ Z- T# T
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
) F6 n7 z0 q! R/ Z+ a1 _ j• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
2 ?2 r& V; w- J: C• Share best practice opportunities and provide an industry experience perspective;
! v0 O' X: P# ^* [: F, j$ w$ X• Support and participate in SOX 404 compliance and Audit review activities.
' T0 ^0 F/ `: V) U O: h
% z" I4 ?# ]2 K
- D/ U' L9 ^5 t2 g1 D4 bEducation / Experience. X7 n& } U2 i" Z2 \( P6 D2 }4 R
• University degree in the field of computer science or other appropriate discipline;
9 A: t7 A+ x7 D; Q- R- q% e* c5 X7 O• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ' u3 M8 b; h, i
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; , {( h, l* T6 H
• Excellent verbal & written business and technical communication skills; ( p! m6 j2 M9 b* p" [8 b
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 1 y" F' X: r2 [' @
7 Z3 y" x& v( b6 X. UThe following experience would be considered a strong asset: 5 U( d; ]6 c* w( F4 O2 g2 @3 \* l5 z
• Multi-tier computing architectures and middleware technologies; 9 a& C& G1 Z9 J" {3 ], x
• Web-based and 3rd party access authentication mechanisms; & P$ }" Y- [7 E7 O. Z
• Demonstrated technical and security solution leadership;
1 c4 n) l: I2 g- Z5 s- j7 E f' ~
Education Accreditation, Certificates and Licenses: : J% K N- G. W" M
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|