 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ R. f# b$ k e; Q
Job Title: IT - Security Architect
# W$ A% j/ E; @: b! x' oPosted Date: 10/22/2009 * g* p8 u, z$ }" L4 n0 N/ ?
Department: IT-Admin 2 }0 @$ a& j, {$ I0 h( A V# P1 h! X
Closing Date: 11/05/2009
+ W7 g N# r4 I# RLocation: Calgary ; {# G! C9 Q0 g) r" S8 t6 Q1 O
Full/Part Time: Full-Time
9 C, a1 p+ c/ \1 V3 m) T# e+ gRegular/Temporary: Regular $ J! h3 w, y/ O+ j
& {+ g2 l" E! H! f9 u8 o7 F- T/ Q
Job Duties / Responsibilities8 |3 @# S* N0 c) d& R
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; J8 _" D; E( t2 }# @. d* v) h5 L5 W
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 8 k; ~9 {- v& k6 t& G
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ E; A5 r5 n8 h+ V• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; - ?9 ]8 h+ C7 _; H8 t/ b; |
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ V; z, s) r A$ L; Q# Q* E: D• Share best practice opportunities and provide an industry experience perspective;
" V# T9 V' _5 G+ ~• Support and participate in SOX 404 compliance and Audit review activities.$ E+ S" u8 k, Z# M+ f% S% h
9 x/ u5 R! x' B& e+ V% t0 ^
7 L! X( F; e5 U1 G0 MEducation / Experience
7 T. G0 c" d7 w0 s• University degree in the field of computer science or other appropriate discipline;
; k* @" {) o& d• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
( i4 r8 H7 q8 E3 ^" |- v+ B* \• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
# N) [! J( ]! F9 j• Excellent verbal & written business and technical communication skills;
( L$ ~; L: m4 o" V7 L• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
8 Z5 R4 _ k6 s5 l* ?! a; q q! Q9 c
The following experience would be considered a strong asset:
$ e1 t' i+ E% B! q3 Y' c) A+ E• Multi-tier computing architectures and middleware technologies; ! o! c, D8 T! ~" ~5 d, J% q% G
• Web-based and 3rd party access authentication mechanisms; & v, D( g# j! ^+ w, q' Y1 W
• Demonstrated technical and security solution leadership; 7 {9 L7 d" m/ M+ Z
/ S' X* D( |$ t1 `- _
Education Accreditation, Certificates and Licenses: 9 M* d" v/ u" ?
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|