 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
& j& n3 } A5 R# O% w) q( MJob Title: IT - Security Architect
1 m" a: ^' O; j/ ]Posted Date: 10/22/2009 . p. [, {) t* N% p% P/ F
Department: IT-Admin ) [) o9 y( S. D4 w1 j- z- m
Closing Date: 11/05/2009 . k- P: g/ `( z8 q; Y
Location: Calgary
8 X) Q6 o7 ^$ @% z; p2 |7 U# e, q' {Full/Part Time: Full-Time 0 u1 d" v# S# D6 w& H
Regular/Temporary: Regular / E; g- n4 L8 |* h; _7 G0 ?
. `0 c& Q6 @+ ]Job Duties / Responsibilities
) h$ x3 k, U9 D7 @5 b7 U• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 6 ~8 a8 k4 g8 a; a0 z) V5 h
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; " R; n6 O- R7 S3 Z
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ o1 c$ n/ u6 Q, ^8 e- k, B• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 3 c. ?1 l* n9 O9 q6 B5 k
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
* q) { \" m8 s/ |/ X• Share best practice opportunities and provide an industry experience perspective;
& U e2 P, R+ a8 ?- o' r! k• Support and participate in SOX 404 compliance and Audit review activities.
' q$ B- }/ ~" |: i$ T1 v8 R, y2 F0 Z
' Y" b: ^1 Z" LEducation / Experience
7 |6 v, |8 @$ u; B7 k• University degree in the field of computer science or other appropriate discipline;
& M V% d) f5 e% x• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 2 V" `( p- b/ M
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; v- K: w" C( h+ G, l/ M
• Excellent verbal & written business and technical communication skills; 1 K# G; i/ X$ e1 k
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. Z3 o/ `1 b' }$ D. n
" ~+ H' s1 ~, X5 d/ u q) KThe following experience would be considered a strong asset:
2 {6 O, h& t- L% B7 n• Multi-tier computing architectures and middleware technologies;
4 U) X& d4 {( g1 _• Web-based and 3rd party access authentication mechanisms; ; d; {7 {& K! N* N4 j: {
• Demonstrated technical and security solution leadership;
$ O$ M6 }* q9 O+ ]- s! n; @# ^2 G L
Education Accreditation, Certificates and Licenses: + M V( N s- s9 L$ H" a9 T" y
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|