鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
8 N6 H f0 C/ }0 ]8 v) k2 y. yJob Title: IT - Security Architect 6 @+ z* l ?0 N& a
Posted Date: 10/22/2009 7 s$ G( q; }. }, G$ w+ s' }
Department: IT-Admin / E+ v" `8 H3 _! e* }
Closing Date: 11/05/2009 ' ?; C# E% x- i' b& g f; O. k
Location: Calgary 0 A1 B* v& F! f0 X% @9 W6 w
Full/Part Time: Full-Time , } N& M% s O6 o
Regular/Temporary: Regular * c# M# h1 a" f* j
1 T! t, B1 {! C; E" S# J
Job Duties / Responsibilities) S9 s/ u# A' t# n2 N1 m
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
0 u M4 V% V- M3 P) h7 e H: D0 r( @6 U# U• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
' ]' Q& A: h# q# S• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
; B/ ^" d$ d$ e5 A( Y2 t4 P• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
6 b8 F/ x" l+ t- x! @1 R; z5 |• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; : r/ q& S& n" {+ A
• Share best practice opportunities and provide an industry experience perspective;
, b# Y: O, J; r) g3 a% `• Support and participate in SOX 404 compliance and Audit review activities.4 P" W8 W: Q/ g( q q7 e
6 U% ?8 p3 z+ s* T6 f4 A& P% e* ^* c: d; E5 ~1 E% A
Education / Experience
/ O% H* W/ O' N [, D• University degree in the field of computer science or other appropriate discipline; ! B+ E8 Y, o. y* a1 B; y/ J
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; - Z6 f$ L; g; l" G8 v5 f
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; : G4 M$ C" o0 @/ A( n3 O; l
• Excellent verbal & written business and technical communication skills;
# }& F/ y; B5 N6 r+ W2 L# d8 P• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
9 J! b* Q) v/ `4 U& Q+ K
% B, L* D( h. k: ^ d" y+ ?The following experience would be considered a strong asset:
4 i9 E U7 v0 _, w• Multi-tier computing architectures and middleware technologies; 1 V6 Y" b1 x: {7 o7 R8 f
• Web-based and 3rd party access authentication mechanisms;
7 Y2 T# g: K8 ?8 Y• Demonstrated technical and security solution leadership;
2 o! H8 W# K% E. c1 n: U9 s/ ]9 `. N9 O6 D
Education Accreditation, Certificates and Licenses:
6 R: o* g1 v7 b9 o8 g+ L* B4 j• Possess or be working towards a CISM, CISSP or CCSP certification. |
|