 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
6 l6 ~- O) @* u" e3 m& iJob Title: IT - Security Architect
# W- p9 f8 p+ ~# WPosted Date: 10/22/2009
4 o8 z& H8 v1 QDepartment: IT-Admin
) K7 {4 j3 Z0 K1 g9 vClosing Date: 11/05/2009 ( K- [+ k, t% W( |4 [
Location: Calgary
4 b7 b) k( ?: {Full/Part Time: Full-Time
1 _& z* D8 ?) y6 p; `) NRegular/Temporary: Regular
" Y9 N; v% W% ~2 e
+ t* G; J5 _$ J( g% u! @' NJob Duties / Responsibilities
& e M2 ^5 m' @1 x1 X8 v1 ~/ m• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
4 ]8 o) _9 E Q1 ~• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
/ J+ T/ Q p6 N- R% s5 y• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
+ S% E$ t4 N( @; ~3 |• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ) d& [3 D% v% O$ t7 V' g/ I6 Y
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 1 s* \# }- G3 O' @/ D v5 q
• Share best practice opportunities and provide an industry experience perspective;
% g D; j T1 Y1 U) d& R• Support and participate in SOX 404 compliance and Audit review activities.; T/ o5 B+ V( y& Y& |2 i: l
1 u* E. d8 |/ m! B) L! M- ^/ U
- _: }4 n9 h4 E/ V8 H0 W- X3 Z) dEducation / Experience: _' ~; p7 ^1 S) {" X1 ]" P$ X; C
• University degree in the field of computer science or other appropriate discipline; 4 T2 ?2 k; s' n* x$ F
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 5 p6 v6 V" B. M8 S, I, I* _4 v2 ~
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
( G9 {5 A/ R$ P% e E9 ? m• Excellent verbal & written business and technical communication skills; # E, @* k* L/ l$ D2 j# c
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ( A( t' \' u" \% w
0 d( L9 H; v( |. Y( }% B1 g
The following experience would be considered a strong asset:
& U4 n5 K- n4 d7 @- [• Multi-tier computing architectures and middleware technologies; 0 B1 n+ c7 O8 c1 D
• Web-based and 3rd party access authentication mechanisms; / t4 _2 x" m% V+ p1 R+ f. U. E" P
• Demonstrated technical and security solution leadership; 3 |, a/ u5 p. j! T2 L" P. u
5 w& ?: [) Q CEducation Accreditation, Certificates and Licenses:
2 L3 C) M9 C' }, F: u• Possess or be working towards a CISM, CISSP or CCSP certification. |
|