 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ L8 L/ O) y; m) V) I# w0 ~" P
Job Title: IT - Security Architect k+ W3 F8 g7 C- X/ ^; \& q, P
Posted Date: 10/22/2009 1 |: C9 Q5 C3 H% p d
Department: IT-Admin
% b8 _9 f H8 CClosing Date: 11/05/2009
$ g$ v5 ~4 m `5 }Location: Calgary ; L9 J* T J4 c) g5 a. _9 C, P
Full/Part Time: Full-Time 0 u( e# m' |" a2 u O2 C3 ~
Regular/Temporary: Regular
9 w3 |! ?! O/ }( A" D# L- a4 ]( z1 t6 J: o4 M- o) a
Job Duties / Responsibilities. Z" N. i+ c- E- \
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
* ?$ ], b# f0 |, l- w& l6 V3 @- r0 V• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 1 W! l+ r. I6 R7 N3 r
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" V( `( D ^8 D) R% t• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; / F9 ]/ a c$ j# j, T
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 2 @! v: d. f1 i3 r, I
• Share best practice opportunities and provide an industry experience perspective;
2 b6 M3 T6 F7 J% o9 m5 M• Support and participate in SOX 404 compliance and Audit review activities.! i: P; H( W Z( m$ T, _) g: W
' c2 t: n! ~) D. h0 W' p q
- }+ D2 E, X* r* b7 }# s2 pEducation / Experience
4 N4 ?/ n( W& Z5 Z1 r• University degree in the field of computer science or other appropriate discipline;
7 M: A& ?5 p* | E& [• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
: n3 w: w0 G* i/ X7 i6 C2 U• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
5 t% W+ q0 p* @• Excellent verbal & written business and technical communication skills; 8 Z/ |2 l2 {9 O
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
; a: H2 c& C4 `" o/ p. J8 J3 J) E0 _0 Q0 }, |$ l4 j
The following experience would be considered a strong asset:
4 G: q4 W# ? x; e- Y; o8 u: h8 D• Multi-tier computing architectures and middleware technologies;
; ]5 n8 R8 y; }: w$ G1 d$ \• Web-based and 3rd party access authentication mechanisms; `( Y5 N# Z! o
• Demonstrated technical and security solution leadership; ! E! y% D4 B3 F* m
5 l5 v1 ?4 A3 o& Z
Education Accreditation, Certificates and Licenses:
0 ]0 r* G# A( N! r! @- G• Possess or be working towards a CISM, CISSP or CCSP certification. |
|