鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
" M: p6 e1 m: l: TJob Title: IT - Security Architect , ^: c3 W1 Y- W5 n
Posted Date: 10/22/2009
5 d' i* t; y5 S7 u5 N' K6 x3 [Department: IT-Admin
* s% M5 ~1 n% Z4 p6 {8 Y% L/ n) SClosing Date: 11/05/2009 2 ~6 M5 N* U3 o8 i
Location: Calgary
% a* [8 L, d( r3 c& M0 aFull/Part Time: Full-Time
7 ~' C) B2 @& x1 J% V( L6 g% PRegular/Temporary: Regular
' h9 C2 y9 L9 J! R& c
6 P6 u+ S* M" q+ }0 ~8 Q* R( IJob Duties / Responsibilities7 R( `& }2 o$ e
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
5 Y& M% f8 N$ h2 C• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 4 Q2 a; a5 W1 x
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
6 I7 F. e2 w3 B& N7 L• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; $ W! h# j& D4 c+ W# H
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # R' {) h& r ^& D& H; U
• Share best practice opportunities and provide an industry experience perspective; & G( Y2 y3 B( I! F" s
• Support and participate in SOX 404 compliance and Audit review activities.! T( i7 V5 e6 N0 d) G0 \/ z$ q
8 Z, O6 w4 \3 j7 K7 y* W- A, X4 ?7 q; J0 P% O' z1 f
Education / Experience% ~3 S% J- t- \5 o8 c
• University degree in the field of computer science or other appropriate discipline;
+ a2 S! H/ m! T7 i• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
; A- S3 V/ I7 U8 q• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 6 [- ^3 w3 A [6 n) s; b$ U, `9 r l
• Excellent verbal & written business and technical communication skills; / I u5 a$ Z4 C9 x# g+ ~ {
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. " n! J9 B; t: o5 ~. E) H+ f( {
' y5 k& U* z- \1 e$ ?The following experience would be considered a strong asset:
! x% I% `1 M( _8 A3 v' b5 H; s• Multi-tier computing architectures and middleware technologies;
6 W; M( L- p$ d1 j) p+ t6 n/ V+ V) G• Web-based and 3rd party access authentication mechanisms; ; r# V2 R1 C7 c* v
• Demonstrated technical and security solution leadership;
# h% J( j. T+ D0 s' W
! l/ v% }6 O, r- \7 CEducation Accreditation, Certificates and Licenses: ; _+ T8 |5 N' T
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|