鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
. u$ G5 D9 E9 QJob Title: IT - Security Architect + H' T0 E- U" P' i
Posted Date: 10/22/2009 ; {: t5 [: K: u# |. f7 w8 L$ @
Department: IT-Admin
! P2 I; B" B9 HClosing Date: 11/05/2009 6 g) ^: J& i! H3 v! i( E
Location: Calgary 3 ]5 [5 G% Z d1 s
Full/Part Time: Full-Time
8 z3 ?1 B7 \4 I7 f$ CRegular/Temporary: Regular 1 m! W+ _; I# m5 N- j6 V
, P+ M3 L4 T9 J" Y" r) G, r. F# A
Job Duties / Responsibilities
; U3 n' N# {6 ^• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
6 d3 C" {+ ~' \" f- |• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
0 d, J" \3 D/ v/ i. G1 }0 M• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
5 _, w/ V' I2 [• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 5 v# s( M* B9 a; S/ _4 u
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 2 l( f7 q+ D# c1 g4 ?. a Y
• Share best practice opportunities and provide an industry experience perspective;
0 k$ [" w8 M6 \6 s5 J( k# A• Support and participate in SOX 404 compliance and Audit review activities.* {( M1 [3 E. f% M$ E. q8 T9 h
7 E5 }. Q+ Q Z* a4 G
* ~( i6 m8 e3 i" b9 J1 \Education / Experience
4 [( `, U# T- }' A• University degree in the field of computer science or other appropriate discipline;
6 @& |5 ]2 S% W• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 6 K! l% u' N8 K( b6 F
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( v; [3 ]. ] ~1 C& }, H0 A e
• Excellent verbal & written business and technical communication skills;
: k u, g( z8 I& y: ~6 ~, w• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
/ g: l' }+ k3 H; d9 I* B- A& ]: J' \9 Q- c& R
The following experience would be considered a strong asset: & U0 Y& J' M. r7 N
• Multi-tier computing architectures and middleware technologies;
+ `1 q! e: B' B• Web-based and 3rd party access authentication mechanisms; 2 |+ l7 q4 {) v) i; n
• Demonstrated technical and security solution leadership;
# ~3 B9 l9 Q1 w3 ?. O P7 V9 Z n1 I
% }! n( F& z9 { HEducation Accreditation, Certificates and Licenses:
4 V) i; G. U8 v# ^5 c: n. B• Possess or be working towards a CISM, CISSP or CCSP certification. |
|