 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ( S5 B: L! m9 o" |+ i7 P
Job Title: IT - Security Architect % V% z9 I; ^, N1 s% P
Posted Date: 10/22/2009
' @& E f/ G+ @. j. J {2 ODepartment: IT-Admin . `1 n! l) D: w+ ~" |
Closing Date: 11/05/2009 5 L& @+ }: C5 ]" b: M( {0 o
Location: Calgary
% |) F6 n, `/ T8 rFull/Part Time: Full-Time
( B8 G6 X( K5 a% I( MRegular/Temporary: Regular
4 i C* v @# o" P
! T7 D9 |5 G2 S. t4 A: ~ GJob Duties / Responsibilities3 W d& k0 s8 W+ c n, o
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
. d/ l2 Y: W& {3 M% P2 O• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
: C/ M. {9 u$ @1 Q2 ~/ X3 ]/ p• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 8 Q& l7 e7 E) o
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : L5 s0 N7 i2 x1 B7 Y( b
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
4 [) I) T& q9 {5 ?/ t. w• Share best practice opportunities and provide an industry experience perspective;
. |1 [$ H6 M6 T% B. b$ E• Support and participate in SOX 404 compliance and Audit review activities.. ]1 f1 n2 G6 p2 L% l+ I
$ @8 ]" ]8 m! e6 S6 }; c
$ ?9 l" ?8 H9 S! yEducation / Experience
, y! n: I+ c" t• University degree in the field of computer science or other appropriate discipline;
% p" ~! {6 }, z( A; m, O% V• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ) H/ @ \+ M6 `# m
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ! x5 p% [: m" }
• Excellent verbal & written business and technical communication skills;
/ n/ @/ f) i. E/ B" h! \• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
0 \- C2 e. w e* J: n5 C2 L
! L$ d3 F* T4 ]. r9 HThe following experience would be considered a strong asset: / T) G, ~) }3 O- s+ Y8 F
• Multi-tier computing architectures and middleware technologies; & d$ e+ v; ]* B% n
• Web-based and 3rd party access authentication mechanisms;
! \5 ?8 y- O% k( J% C! w, J6 E• Demonstrated technical and security solution leadership;
: [6 Y2 B+ {# G! _
" U" }7 \' W3 \" e4 i0 [* `1 eEducation Accreditation, Certificates and Licenses:
* K: E+ _4 C: T1 g+ _2 t. ^• Possess or be working towards a CISM, CISSP or CCSP certification. |
|