 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
; _0 P* G1 l! `0 ^ ?Job Title: IT - Security Architect . F; A- |4 U# E& t( e
Posted Date: 10/22/2009
# _ ~3 W& c: @; A, _9 EDepartment: IT-Admin
8 i" S; \* s2 M" GClosing Date: 11/05/2009 # u) [: }1 N# G- |/ z0 P
Location: Calgary & l ?* f+ v0 _. r$ }# r7 H
Full/Part Time: Full-Time 2 w0 r m% b( u5 ]1 @
Regular/Temporary: Regular 3 D2 @& `6 g1 W& G# K& p
! q! ]/ O5 u2 f. z9 p8 x
Job Duties / Responsibilities
0 h. i+ H5 r' Y• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
7 o1 r4 {5 Z8 [, E; v5 m• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 6 N: R3 r5 ?: p" b9 P8 ^7 F
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ( `% O3 f+ T$ v+ k
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 1 I, x1 }6 c4 x. a
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 1 B& Q) P: Z1 |" i# Q+ J4 B
• Share best practice opportunities and provide an industry experience perspective;
4 m+ _" ?5 }: ^! H• Support and participate in SOX 404 compliance and Audit review activities.. T% l' R" K% w
% K, j6 x0 J% Z& a! N B6 C5 q4 x* c3 F0 m5 \4 l- q4 {
Education / Experience4 H$ w5 D5 d8 e+ U9 n* S
• University degree in the field of computer science or other appropriate discipline; + X7 P m7 A0 B& m) E" x3 \
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 5 U) x* w3 F+ v7 O' ?
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; " E% j X0 E$ d, ?/ V$ y. Z* U" W9 V1 C
• Excellent verbal & written business and technical communication skills; 1 U* w1 a" } ~4 S# c) q
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ; L3 C/ P5 |( h( u
; _# `$ _; \1 p& J0 u3 F
The following experience would be considered a strong asset: 0 Q- W& I3 U$ g5 l# \
• Multi-tier computing architectures and middleware technologies; + ~2 b$ s- V7 y0 x
• Web-based and 3rd party access authentication mechanisms;
4 @) V! }6 T6 d% S& _( `• Demonstrated technical and security solution leadership;
9 [& O" n( _7 C/ M" h
o; }3 x) F7 c0 }8 rEducation Accreditation, Certificates and Licenses: 5 D% f3 ~& J" l2 }/ K( v0 ~
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|