鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
( Y- m2 s1 M2 D4 P3 }$ WJob Title: IT - Security Architect 7 {0 G; H6 s8 {; F0 ?) |5 R
Posted Date: 10/22/2009 0 [% p2 x v" C2 R3 G
Department: IT-Admin
# r, y* s1 n: n" u4 D0 hClosing Date: 11/05/2009
3 P F5 r" K ~( z( Y: ?Location: Calgary
( ~+ A# K$ |6 [- GFull/Part Time: Full-Time : T0 H0 ]- d/ S) D' W+ {4 k3 O
Regular/Temporary: Regular $ l9 E, B3 p; F0 v' t- k' ~
: k F* d% K& e% m: o% N$ P- jJob Duties / Responsibilities9 u5 y! H: u* R' y
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
+ F% ~0 o% |% i+ l• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
+ C9 c9 E- ?7 d) O% d) t9 T1 i• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
8 ~: ]9 ~* e0 s# A; O" c$ `• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 4 {9 L: A0 ~4 j9 s" J. m* X6 c1 S" `
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 6 e- o: o0 M" s5 [' ^( O+ E3 s, v6 `
• Share best practice opportunities and provide an industry experience perspective;
& D; E- e. s; b$ c3 i• Support and participate in SOX 404 compliance and Audit review activities.
6 k, R% R8 _7 y$ d7 H9 z$ p- W" Y
( t. i/ a! m7 g+ s1 k4 C4 K! u, d9 H+ c
Education / Experience
, I- ~7 L6 V m/ L/ K4 J• University degree in the field of computer science or other appropriate discipline;
5 l( \1 T, b) Q7 `6 `• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
+ P* F; z4 Q% F5 E U• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 6 R( H" V: w E0 j- P$ D
• Excellent verbal & written business and technical communication skills;
e+ ]+ \; m/ g( E, g& ^• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ( b9 M3 a& ~: A7 l% n
t6 t9 |) H9 ]5 UThe following experience would be considered a strong asset:
B: b/ ^; ^3 Q# J! |/ W: _ }• Multi-tier computing architectures and middleware technologies;
" K& x. u5 t2 D9 U, [6 D% k• Web-based and 3rd party access authentication mechanisms;
/ r9 {/ p2 f4 ~. ?! t. C* j1 y• Demonstrated technical and security solution leadership; ! ~: ~2 H2 o$ b; x L% O
! l# D8 T" y+ R# A/ }/ [Education Accreditation, Certificates and Licenses: 0 ?! d: M0 T9 P6 R! b
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|