 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
$ p% a9 L% h+ I( H6 VJob Title: IT - Security Architect . i1 L* S. ~; w q1 g/ n; ~3 G
Posted Date: 10/22/2009 ! n2 Q- q) C# k* q2 v
Department: IT-Admin
2 R- z# ]3 ^( \ ^. KClosing Date: 11/05/2009 + g; [% c+ L: M. C
Location: Calgary
5 _7 s& F; } J# w1 oFull/Part Time: Full-Time
+ v7 a: o4 A, r: Y' `0 @. I% RRegular/Temporary: Regular
, H( Q: z& w3 \& z9 ~ P1 H: H$ q( w! f. ^
Job Duties / Responsibilities! }5 F1 H4 n0 U8 A7 q& a
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 7 d f* ~0 `# u# K1 D! q8 x, W
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
0 d h6 p9 J) M: G6 b$ |• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 6 ?3 `! z$ u' @. s, F
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; + F/ j; }" j ]9 c0 D% v, s
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
; s3 I2 G! j; q3 _* e• Share best practice opportunities and provide an industry experience perspective;
. u2 W' _5 i8 X( i% z• Support and participate in SOX 404 compliance and Audit review activities.& h, E- o5 T- z/ y7 u
1 a2 F9 _$ j1 E; m* H( q
, d& {7 s' K' f( W4 h) F
Education / Experience
& B) V# W3 [( Z1 V4 d• University degree in the field of computer science or other appropriate discipline;
. l5 g6 v, P3 s8 S! x2 U• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; . H* g2 `% m Y, U6 ~7 \: ^
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 3 D- A- C1 n2 n
• Excellent verbal & written business and technical communication skills;
; r E& m- ~% r e4 P8 Y J• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
} }8 O+ b6 g, e% ]0 E5 S4 O
7 H5 \3 _0 J: ^2 M- U3 PThe following experience would be considered a strong asset:
6 H ]* }! o; H1 b• Multi-tier computing architectures and middleware technologies; 8 S# a5 f! l$ {2 h! ~
• Web-based and 3rd party access authentication mechanisms;
# x+ d6 b4 V2 K, J, ~. c• Demonstrated technical and security solution leadership;
I. g+ K* d5 p/ y( R+ M
; y$ ]8 \1 t7 Y. hEducation Accreditation, Certificates and Licenses:
* K. U- N/ j+ ]/ g& g8 _/ g: @' P7 I" @• Possess or be working towards a CISM, CISSP or CCSP certification. |
|