 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
9 D: ^* i+ S* I; a5 xJob Title: IT - Security Architect
* E4 d* o. ?# ?: [& O' ] |" gPosted Date: 10/22/2009
+ Z) ]! e5 X- a3 k, h# Z' O: TDepartment: IT-Admin
+ ?- p3 }/ V' \! s) O: JClosing Date: 11/05/2009
6 u* R5 w/ A. M0 J& yLocation: Calgary
; D2 v' b+ E5 l% RFull/Part Time: Full-Time + {% r0 W' a% _$ N
Regular/Temporary: Regular 8 ~ X P! q" f( }8 S9 A6 C! h
' D) G( E: }& C* v: n' o3 a; o& ^
Job Duties / Responsibilities* f' z( }/ x5 c3 h5 ?& e0 P+ v
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 3 v" W, {. `0 m% `! d8 ]8 j* F
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 3 T I4 x0 L3 V
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
9 z5 B! r0 v( r3 G" t• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; $ x, ?9 p! m* w& q, q! Q1 O6 Z
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
7 q6 ]% s5 p" j" X) n• Share best practice opportunities and provide an industry experience perspective;
# S m9 u; Q9 e; R# A+ {" g• Support and participate in SOX 404 compliance and Audit review activities.) r% X7 K) u* ]
+ h* i( [ D) g% u: `0 L
' q/ I7 `6 q9 u) w5 q: {0 b5 D
Education / Experience# D. b8 B, w4 P+ }9 t$ k5 T. T1 S
• University degree in the field of computer science or other appropriate discipline;
& j3 |9 _5 E7 b/ U: @4 r• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 8 ]' Y7 s2 S% f6 w/ R
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; % ~7 o( J$ j% u
• Excellent verbal & written business and technical communication skills; ( Q+ I* }9 W) B& |$ g6 Z
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. * }/ L X5 f+ u7 M w1 w) n
& m/ G$ B P7 Y* N/ PThe following experience would be considered a strong asset:
5 v! e5 r; q9 _! v* r• Multi-tier computing architectures and middleware technologies; ; q( E/ l5 d9 @
• Web-based and 3rd party access authentication mechanisms; - E4 X l$ D8 r$ [! }- P/ n* M# x
• Demonstrated technical and security solution leadership;
3 o4 |" t0 v1 T+ y. E
; v1 b' R- E O a+ nEducation Accreditation, Certificates and Licenses:
f6 [" J( I! ^0 j' U5 i" T D• Possess or be working towards a CISM, CISSP or CCSP certification. |
|