鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting ; Z2 J2 ?4 M1 d/ n" a
Job Title: IT - Security Architect
7 o3 h% E- w7 v) o' ~& |Posted Date: 10/22/2009
2 t: g: p/ m9 [2 g2 I3 VDepartment: IT-Admin * f" s+ F( s0 U$ ~# g* M4 T6 g
Closing Date: 11/05/2009
9 V, g* b$ {7 Y CLocation: Calgary
( o' p! l( p9 ~8 ?8 S9 w1 SFull/Part Time: Full-Time & ~5 w; M2 \1 C
Regular/Temporary: Regular - c/ D. u; `8 _1 \& n! \
$ Z% s) v, m" D# u5 t
Job Duties / Responsibilities; ]- a) w* r( |' a8 a
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; / p$ o7 w: @, _! Y, I
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
* _7 c: `3 E' U5 y• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 4 w( {8 d2 o! u4 s2 N- Q9 z0 Z
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
% X# K, D& M. O2 I" _% S! k) }• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 8 }1 B( H! F/ `9 i) f
• Share best practice opportunities and provide an industry experience perspective; , E& S: z( x& Z8 K$ C- N t; O
• Support and participate in SOX 404 compliance and Audit review activities.: h W( W, O, v% o. Y/ u
P/ D7 { i0 z( U2 x M& G+ H
) i/ N$ D% \8 l6 ~9 t; \Education / Experience$ V! y9 q$ w7 P
• University degree in the field of computer science or other appropriate discipline;
9 [# z6 F& [9 _/ w& ^• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
# b" }" s+ j+ t8 W/ Y• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
1 [ p7 u* j$ q1 ]1 {& l% v; b• Excellent verbal & written business and technical communication skills;
" N0 p# ?9 a, ?8 d6 G• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
" Z9 _0 o# o: a3 G7 T+ k/ R# x
\$ A5 y) N# K$ V1 t% I% yThe following experience would be considered a strong asset: 3 a) y: X8 n2 b* o( J
• Multi-tier computing architectures and middleware technologies; 6 h! E2 {) N" c" E Q2 O6 m
• Web-based and 3rd party access authentication mechanisms;
! l+ [/ o% g2 N: _3 A! _0 Q$ y• Demonstrated technical and security solution leadership; & n' y$ K; @5 J0 ?/ @- d
* a0 L+ V( A& [* g6 @Education Accreditation, Certificates and Licenses: & J" W; O/ e! ?8 k
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|