 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
# ?/ M. c" j: [! c) RJob Title: IT - Security Architect + c D+ L% e8 Z+ p
Posted Date: 10/22/2009
8 `+ g! D% s9 }& M2 \9 B3 }Department: IT-Admin
5 H& E, v0 i+ z6 CClosing Date: 11/05/2009
' ]1 @9 a/ R* ]Location: Calgary 5 @& I$ y! j1 N$ u( c; i
Full/Part Time: Full-Time
# |& f. q# ]& G" e( C: TRegular/Temporary: Regular
" n7 `/ S$ E# b$ O3 O
: a. g# L \+ d6 ?8 ]6 ]Job Duties / Responsibilities3 p7 x4 V; s, F: i, n
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; $ j6 v7 V( t5 E* `8 w6 ^; Z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
' {$ n* Y' F& B• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
6 m5 T5 l. Y3 i, ~0 l/ t# I• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; $ P& L3 C. k1 M% U4 B; B
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
& ?" O( v9 W: K \1 E& F2 K. I• Share best practice opportunities and provide an industry experience perspective; + S6 t0 F4 g5 p: R
• Support and participate in SOX 404 compliance and Audit review activities.; w% x+ Q% u: q! @- G' T- v& w# P( H
% \: T6 ~/ n2 W! B5 i, k
7 \+ b. r; p8 I' cEducation / Experience
' H2 I5 ?* ~6 E# I }1 _• University degree in the field of computer science or other appropriate discipline;
' ]7 y# D- @- K' k# G$ a: j• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
/ ]2 g( h8 e% y• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
+ g$ s x( T% u' L1 ^# I• Excellent verbal & written business and technical communication skills;
# ^0 m. y8 c1 C2 {1 J8 d/ }: m• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
/ K/ h7 `# ^# l8 u
* W/ b9 A' m1 K& O2 `: k. |% N8 t3 [% CThe following experience would be considered a strong asset:
7 P, Q$ {5 ~3 X: B$ ]+ O0 C. P0 A& j• Multi-tier computing architectures and middleware technologies; % m/ T: n! s# g5 |- w
• Web-based and 3rd party access authentication mechanisms; i5 Y p0 k# H& [4 O8 {4 H% u4 d) P
• Demonstrated technical and security solution leadership;
, }" J' Q% a+ \) I0 `2 P: p R! \
Education Accreditation, Certificates and Licenses: 1 i, d$ S" c3 y) ]' F8 N3 `# i) k
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|