鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
! w) b% \ Y$ a7 G7 _- _( A8 BJob Title: IT - Security Architect 9 _) d3 ?9 A; U
Posted Date: 10/22/2009
9 S% k( \* ~- B8 \; Q J9 eDepartment: IT-Admin ! ]+ C- l" Q- b6 ^; P
Closing Date: 11/05/2009 & G3 q/ ` x0 M% v7 C8 k" R
Location: Calgary
6 D$ c, A! S- T9 nFull/Part Time: Full-Time
4 P( x0 O9 D0 G4 H* S& _, FRegular/Temporary: Regular & e! B4 W) U1 w3 ?. ]
9 Y L) Z2 }; g6 j) z! C
Job Duties / Responsibilities
% t j L% l3 H% t- `# p1 ~• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 9 [" ~# J! N/ ~; D2 H! X' U
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ( d$ {1 }: s0 c/ b
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 9 |7 V% @. W: i: t( W$ V4 j
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; % G1 J' P/ }5 K; u3 Y, t
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
! G8 w8 d" G' K6 t* r0 r+ M _( H" m• Share best practice opportunities and provide an industry experience perspective; 9 a2 z1 y |! d7 j0 ` T
• Support and participate in SOX 404 compliance and Audit review activities.
E5 @1 u2 J2 T( L" d- k2 P$ e/ ]% `4 B: c. ?8 `: O+ L
/ D% y$ l1 a8 A0 u0 z' G* R3 u
Education / Experience
6 [2 y2 k/ @' b; `9 I% c* [• University degree in the field of computer science or other appropriate discipline; - B! h( S2 E6 t* ]% P6 k
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; s- k, O7 ], M3 O, }
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
$ n% E5 _9 Z8 r$ g7 y4 p: I• Excellent verbal & written business and technical communication skills;
' i t5 ~6 N. y. j! e• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. " n3 d- X7 Z# k% [
3 x8 ]* l- g! Y, G# UThe following experience would be considered a strong asset: # y: l2 c5 A% g7 [ G L$ O* B- h, ?
• Multi-tier computing architectures and middleware technologies; , J$ W) x2 L& a: @" l6 J" o+ z; n
• Web-based and 3rd party access authentication mechanisms; / d0 N7 n! d; g) }1 @
• Demonstrated technical and security solution leadership;
8 l+ b y, a+ @/ \3 u2 l+ v4 |, `; x- j0 \ S
Education Accreditation, Certificates and Licenses: ! Q6 j, a! R8 m1 v' n; ^
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|