鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting - H1 p+ O7 W; C: d! c
Job Title: IT - Security Architect
% p9 A l' }) S8 cPosted Date: 10/22/2009 + J# t5 G. o7 C8 b& U; |! D
Department: IT-Admin 3 S; p$ s9 a, _2 v& v
Closing Date: 11/05/2009
F5 v: S' Z$ e: C/ x' VLocation: Calgary
5 ^, c+ m$ W6 I( wFull/Part Time: Full-Time
( t) [1 e$ }# k5 WRegular/Temporary: Regular
1 W' g1 ~$ M+ b2 A) q8 {5 |# l7 N9 M) \' L$ w$ T9 y) q U( y3 i
Job Duties / Responsibilities
$ t& j6 X& ]: N6 t0 ]• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
, u2 O" C5 O( g6 _2 Q7 Z {: L• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
6 D* e1 w0 ~8 L% t# w' T; m• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
3 A) `8 ]5 i I6 I. c9 `• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
! @* R2 @; o/ L4 u) Z& A* C+ ^• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 1 Z( v; R! v# Y4 ]. R6 [& h4 C5 l
• Share best practice opportunities and provide an industry experience perspective;
! `. a O2 P: c4 U/ Z" W9 p+ f• Support and participate in SOX 404 compliance and Audit review activities.
* e) Y: G( w" f* x( |* j1 N6 w: {- K. A Y; f
3 _6 y* D" X, dEducation / Experience$ ?7 [% x- ?8 F
• University degree in the field of computer science or other appropriate discipline;
$ |* R- g5 ]0 K2 R, w2 k+ b• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; & y( L* q3 b/ G' k0 P& G }' V- ]/ G
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; w1 K! L% x, @1 H9 t' \- B
• Excellent verbal & written business and technical communication skills; - j. Z! @: [9 K* A& ~1 Y7 [
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
' G- w9 B4 h: M4 X& A' d. V/ y7 D9 f" ^3 M0 k
The following experience would be considered a strong asset: 8 t# M0 y; X5 M! E, x0 [. Q3 w! ?
• Multi-tier computing architectures and middleware technologies; + o0 D! r; {- `; E
• Web-based and 3rd party access authentication mechanisms; n/ s% @& w+ ^) S9 H% S
• Demonstrated technical and security solution leadership;
, S$ V9 Z( `7 P% j: ~( m, O: N: N; l' l a- @- d$ r; @
Education Accreditation, Certificates and Licenses: * ~) C6 _& I6 m0 R
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|