鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting - J6 u. C+ a D4 @$ y, R; {/ U+ g
Job Title: IT - Security Architect
% T* K* Z7 F3 K8 t% [6 yPosted Date: 10/22/2009 & z6 l: T$ a( i' j
Department: IT-Admin
+ `6 D* w* O0 N' H$ R- f4 k# ZClosing Date: 11/05/2009
, u6 U# v4 ^" ^8 v8 H% A# aLocation: Calgary
, A5 u7 l0 ? G- A0 b# ?Full/Part Time: Full-Time 4 x, z7 m/ S/ D6 O `" Q# c' D
Regular/Temporary: Regular
" Q" p! X% \6 q/ `) |3 T6 t6 |6 z: x5 a. m4 B
Job Duties / Responsibilities
+ X) ]: Z) V( M5 w# o% n, w• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 4 \$ u. W8 q6 }3 x
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
. v8 n0 e4 l0 Z! w; L• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 9 X+ @; o0 }. K( k; k0 l4 B
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; [# x6 ^3 B. w% @! ~8 j
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
/ M4 G t/ I( X• Share best practice opportunities and provide an industry experience perspective; ; t. L5 \1 o% f" }: r
• Support and participate in SOX 404 compliance and Audit review activities.. W, G0 T( @3 _! _; g/ G
1 Y( a, h& Y. k! f7 c" E" a4 B. q: I9 \. ^
Education / Experience
* u' M' c0 l6 u8 V' N+ {! c( P• University degree in the field of computer science or other appropriate discipline; # N H* ]1 n9 m
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; , Q- q8 z: C# S8 S$ i" e$ D/ B' X, t9 b
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 6 I- a4 P' w1 P. d
• Excellent verbal & written business and technical communication skills;
/ }: ^4 c' T! S/ n) T• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 0 @" e7 s& B- g# M1 e- a0 X/ T. H' V
$ @/ n& o) A. u' p9 fThe following experience would be considered a strong asset:
3 u- @; g9 c1 ~9 @; z" ^• Multi-tier computing architectures and middleware technologies;
8 Y1 t) v& X" u$ P3 E• Web-based and 3rd party access authentication mechanisms;
" h* ]7 A \; U$ N, T3 V' B! ]• Demonstrated technical and security solution leadership; 5 J, T$ m/ O! P
+ I3 O) }& Z1 v7 ~* k& P+ \3 G
Education Accreditation, Certificates and Licenses:
" @7 J" T/ o/ x) m6 a. O; E• Possess or be working towards a CISM, CISSP or CCSP certification. |
|