 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
" K6 }& V9 T& ?- l" y) B+ }+ i8 f6 ^Job Title: IT - Security Architect / ^5 k6 y1 s% p
Posted Date: 10/22/2009 4 d0 X1 v/ \" e) h* U
Department: IT-Admin : e5 [1 p' z. f, A# p) G9 k
Closing Date: 11/05/2009 ( q7 ~$ `# t6 y4 i2 S# [ y9 D4 N
Location: Calgary
4 d9 @; j7 s3 R/ ^Full/Part Time: Full-Time 7 D3 Z& V+ n' w6 t
Regular/Temporary: Regular
; G7 c7 S$ c" b1 s; Y
+ t% i/ p7 C+ e: x5 \& x: ~9 LJob Duties / Responsibilities
& ?# S9 A- h* E( ~5 D6 O• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 5 R. z s L6 A7 R* \. G, d
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
- a; ?+ ]' K* E, _• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
/ {# H( ]+ L8 S+ Q+ z• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ! y, [& J1 u Q+ E) F; _2 }6 ~2 R
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; % k8 i9 a+ {6 }0 H$ O" ]" `
• Share best practice opportunities and provide an industry experience perspective; " f! t9 D$ T: y l! R0 w( ]
• Support and participate in SOX 404 compliance and Audit review activities.
1 b% A" v% t" y1 h, _9 O4 k. y4 r8 J7 T/ z l2 r9 M2 E
1 _( [* t: Z1 m; B; c' b2 F4 U5 QEducation / Experience! H* p$ F) `! Y3 i' ]
• University degree in the field of computer science or other appropriate discipline; / ~- y i' ^" g' u3 I
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
" Z& B+ W" b, F5 {; W4 x7 D" g' j q• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
' T* P' N; {; q• Excellent verbal & written business and technical communication skills;
5 b$ Z- a1 P0 O6 W9 Q# y7 c& g i+ X• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. $ Z0 @, \" z4 E# D
9 }. @* L+ ]$ d( d3 OThe following experience would be considered a strong asset: 1 ]( D! X1 X D; o1 z5 @+ Y4 M
• Multi-tier computing architectures and middleware technologies; ' f% C. l5 u# W! a
• Web-based and 3rd party access authentication mechanisms; 6 W1 O* }* h3 ?( s B3 b2 g/ m+ D
• Demonstrated technical and security solution leadership; 6 t# s! V6 F9 n5 @9 B7 X5 x
- `% z. ^- G% i5 _
Education Accreditation, Certificates and Licenses: 1 ~/ Y# k, c2 n( n8 h; [; F
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|