 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
( ]' B3 w: B9 e) N% |8 Y, `6 G8 OJob Title: IT - Security Architect
- X. F: Q2 t; a; E) ^! @Posted Date: 10/22/2009 , I) J4 q1 |3 E H& R* @
Department: IT-Admin % d" Q Z. [0 i9 Z+ Q" N
Closing Date: 11/05/2009
; q P: _) Z: o5 D jLocation: Calgary 9 A/ ^8 m. G6 i* P/ j
Full/Part Time: Full-Time 4 K8 U, y& ^3 V: K2 }( d; _; }
Regular/Temporary: Regular
4 f8 P. O2 `8 R' y5 S1 g- @
* h" [' \, ^+ h# aJob Duties / Responsibilities6 a. `/ |( @7 K5 X% T
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; % `- E- n+ h% p8 @9 Y& `- c
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
! f: G. t5 ~8 C3 a5 o• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; % h% U" e6 ]0 [9 P5 t/ `
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
6 F$ _1 S8 f s7 T n• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
6 K7 c8 [' |) X. V* H5 Z• Share best practice opportunities and provide an industry experience perspective; + U0 M7 ~, ^2 s2 t' ?, l' D& f
• Support and participate in SOX 404 compliance and Audit review activities.
# Z- D1 d: m8 b3 T$ _4 _4 L* k( p. ?9 {/ q S9 g
2 k( [% o* H& [0 {' S9 }$ E4 wEducation / Experience" ] C5 r* W, A; F9 T' d, l
• University degree in the field of computer science or other appropriate discipline;
@" [7 U' B% }3 T! J% A• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; % J$ O* j6 \! l7 z/ [' g# D$ Q' ?6 O( k
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; : T3 S0 Z& u) V) T+ s
• Excellent verbal & written business and technical communication skills;
# S) r5 T+ y$ p U• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
: j0 U1 V2 G2 o% a- A4 P. S$ R% z# G. b6 B' @& N4 b* T; N
The following experience would be considered a strong asset:
5 d+ ~6 H3 g1 S4 n9 w& {• Multi-tier computing architectures and middleware technologies; ! }) U0 }& j, ^& a) w3 S! N2 l% ]
• Web-based and 3rd party access authentication mechanisms; " _9 Y( r7 r( p& y3 W
• Demonstrated technical and security solution leadership;
4 P. B! u+ n( E& m- [
2 k" K0 p+ P) u) @5 D" mEducation Accreditation, Certificates and Licenses: - J8 B H* j5 O$ M( f$ y# R
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|