鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
4 |( X3 G) @+ y$ S2 OJob Title: IT - Security Architect
7 `* H% S0 G3 TPosted Date: 10/22/2009 ! d5 y9 d$ a! G% V( C
Department: IT-Admin 7 |: ~8 d6 k5 n* q' q. {. p
Closing Date: 11/05/2009
$ A2 m) [( f$ ^1 LLocation: Calgary 8 S" i8 W9 e9 }8 `; W6 [
Full/Part Time: Full-Time + [! |4 Z) c" X- N2 \# p
Regular/Temporary: Regular . y. F4 J0 M, b( l
7 r9 n2 W# ]6 N% H
Job Duties / Responsibilities; P# T( F1 d& z
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; % d! M$ y* T. |
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
3 e. S. P, B6 Q6 ?/ I• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; " R9 D/ L: l! B }0 H% x/ @" `2 _
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; f# r/ b3 H& v8 d
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
( d. p0 D8 E/ g4 K2 h2 A• Share best practice opportunities and provide an industry experience perspective; 3 D9 M& z' N" [: ^5 m' z
• Support and participate in SOX 404 compliance and Audit review activities.
) a/ _* @% ^$ B/ {1 C$ \) k" t/ @
4 E1 n: Q9 I9 p0 E8 j; V' Z8 ^, h5 ]; O q( A+ f9 R. Z
Education / Experience+ [: ` J3 T' f+ q5 d$ z7 Q
• University degree in the field of computer science or other appropriate discipline;
( J8 h& q* ]4 I( }. w; X• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
: {& q$ C( ^' |, N! z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
# ~' y z: H9 j, R• Excellent verbal & written business and technical communication skills; + O, ~) N: M$ m6 P" v& e8 h
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. & s) t3 K! Q% r; |/ z/ _- m' [
- E) J, C+ ^- J
The following experience would be considered a strong asset:
+ q Q! F! g& C8 h l• Multi-tier computing architectures and middleware technologies; - A- `5 z0 b# E1 v) f
• Web-based and 3rd party access authentication mechanisms;
% D8 ~: {' I q, p4 B$ E• Demonstrated technical and security solution leadership; 0 {/ v/ @* y0 z- @
6 y6 {8 D4 ]; D) y! s4 q0 B( ?" k: j
Education Accreditation, Certificates and Licenses:
% P% Q9 a. v4 z+ h0 d% D& X• Possess or be working towards a CISM, CISSP or CCSP certification. |
|