 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 5 p3 D( ]6 x/ I; c D
Job Title: IT - Security Architect 7 h$ a4 U6 ]) U8 M
Posted Date: 10/22/2009 8 T' v4 s9 c2 d; d0 A5 G9 G$ }
Department: IT-Admin
+ g2 ?; N6 N" R% X2 `' ~% E- jClosing Date: 11/05/2009
5 D, B2 r! z6 ~9 l6 A C" C4 Q4 xLocation: Calgary / U$ y. P6 w. a) D
Full/Part Time: Full-Time 5 m5 Q1 w H( O9 a7 ~
Regular/Temporary: Regular
& K* Q$ d7 \/ S# E2 p" E; u2 e0 d( { c
Job Duties / Responsibilities
# h! ~- Z! v( A* w5 O: t• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; \/ h; S, b! m! H
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; # r& B1 G: U$ e/ l* z$ G
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ( }! P0 U; g7 I) ?0 P$ i. e, L
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 8 f A* |3 C; I2 R/ _
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; / Z6 B$ J6 {9 G& l! D
• Share best practice opportunities and provide an industry experience perspective; 4 w2 M: p: q' J, X$ K' `8 K( E" G
• Support and participate in SOX 404 compliance and Audit review activities." U0 v- n+ w4 I: u" N& i* R
2 S$ G9 L4 B# g P
& `) s6 T- Q" u4 R( L8 a
Education / Experience
/ S! R. b7 \" V9 Z5 S7 v2 f6 C$ b• University degree in the field of computer science or other appropriate discipline; - B8 Z% i- a8 m+ K- y; k
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
! N# B# O' _- D: s2 A) e• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( c3 r% |) m0 [6 L" o# O* C/ `' F
• Excellent verbal & written business and technical communication skills; 4 ]6 F! V# k# F* G; I
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 7 Q8 V. n/ J3 l( E3 m9 F
0 }9 o4 G5 q2 R1 a( y5 CThe following experience would be considered a strong asset:
/ E' R2 [( k K( c' M! a• Multi-tier computing architectures and middleware technologies;
2 n; F9 _# K. `$ n/ @- K! K5 \• Web-based and 3rd party access authentication mechanisms;
2 S( g% [0 n& F$ }5 a9 W• Demonstrated technical and security solution leadership; . L* y/ w& D6 P- x: h# w8 r
, z P( K( s9 b& X% _( ^Education Accreditation, Certificates and Licenses:
7 h( A# s8 ?" f! i: S• Possess or be working towards a CISM, CISSP or CCSP certification. |
|