 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
9 y, {9 t b$ x" K, a' OJob Title: IT - Security Architect + y3 ~+ ~9 q, i# Y3 F
Posted Date: 10/22/2009 + s6 p- {1 O! k6 c! y+ s
Department: IT-Admin " T) i) ~' X' o: F/ C
Closing Date: 11/05/2009
* }6 H$ a1 X; W! i3 O8 N# t: MLocation: Calgary
/ S3 a' Z2 K$ k0 _8 K7 R' q h: i, @9 HFull/Part Time: Full-Time
: G* G1 \1 G# ?6 [3 }! _Regular/Temporary: Regular
" E1 E0 J c- s4 B3 ^+ i* E& f
0 O3 }4 u8 {& YJob Duties / Responsibilities+ \' z5 T5 }" {
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
6 N( `" t# @- c" k e7 P, U3 b• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
5 z' o2 B) [1 w1 g- m• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ s& ]% W1 L* H, @, {
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ) Z8 F1 G% _( v* X' w" V3 T
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; . i5 e) V y. K+ A* U% k" ^
• Share best practice opportunities and provide an industry experience perspective; 0 g/ Q8 {0 c; ^& t
• Support and participate in SOX 404 compliance and Audit review activities.
. J# d$ Q# ?5 E2 `" Q: M
3 n9 h' J9 s5 f& f) i
# F# i1 F9 E& J: b: h( @Education / Experience+ E9 {7 r1 V9 f" O% E6 ~2 T1 p) p" f
• University degree in the field of computer science or other appropriate discipline; # e5 |8 B. [% ]* d2 o
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; " V# k2 A3 i8 i& r3 I9 V7 W3 e
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
! Z6 h( y* S: q• Excellent verbal & written business and technical communication skills; ) d g( w, f: R. E2 L' u
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ) R/ a- I0 K' }9 [5 @" [* |
( C) Z9 l, o& X5 d% y' RThe following experience would be considered a strong asset: 3 c* P7 r" S6 c* x& \
• Multi-tier computing architectures and middleware technologies; ) y4 ^' m. X3 M" s# e
• Web-based and 3rd party access authentication mechanisms;
* q8 U! Q( Z* Q1 ?• Demonstrated technical and security solution leadership;
2 [( G& L- X6 e+ U5 y' @
: c& A% a1 U iEducation Accreditation, Certificates and Licenses:
& h1 }0 U0 x9 d( v% k6 d0 N• Possess or be working towards a CISM, CISSP or CCSP certification. |
|