鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
6 }1 M8 o5 m5 K0 M3 I MJob Title: IT - Security Architect
' z% `- k3 e4 S8 }Posted Date: 10/22/2009 + `+ T2 ?1 J8 @& v8 P6 q1 B
Department: IT-Admin 6 M* i; W2 v6 _0 S9 A7 i; c0 `
Closing Date: 11/05/2009
. L( t9 J# M) V; s7 T( lLocation: Calgary
3 `9 W8 ?; o6 b( @Full/Part Time: Full-Time ' `5 B5 ~: x! w9 B; Q B
Regular/Temporary: Regular
( I, H$ b# y# _. s, C5 p; G& I
/ b( O' w1 n" L* W" w- pJob Duties / Responsibilities& O6 p* p* f5 {9 l8 Z; F0 y# s* [
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
) f5 j. I6 B+ V+ [. O/ i& ?• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; s" ?& \7 _ Z8 G5 j& p' ~/ N
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ l9 ]$ c9 _' E s% \9 T3 D• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
5 @3 p: k1 W8 S& j! ?• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # E% D* s/ h7 a$ o
• Share best practice opportunities and provide an industry experience perspective;
: P0 O# q/ q" b! } L• Support and participate in SOX 404 compliance and Audit review activities.# W$ o2 X) K4 R5 A) k" a$ q
$ V( ]* u6 K7 T8 F
: O% G1 C8 I4 c: w3 s+ ?/ j9 sEducation / Experience
$ L3 F7 o- e; a• University degree in the field of computer science or other appropriate discipline; ( p1 m9 a# d4 Q) k
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
: s' l- j0 \- c# ~# u) ]• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
/ o ~1 X0 t$ x5 ^• Excellent verbal & written business and technical communication skills; , N. x% X0 ]& O
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
& `/ W1 l: N. ^0 C. l0 A+ b0 r# S5 L1 X" ^& a7 ]
The following experience would be considered a strong asset:
1 t3 W! L0 [' ~3 b3 P3 P• Multi-tier computing architectures and middleware technologies;
6 [3 r6 {6 b5 N* ^$ H" ]• Web-based and 3rd party access authentication mechanisms;
5 b X: l+ {+ F+ S$ }) H6 t• Demonstrated technical and security solution leadership;
/ `+ ^8 T' J' f4 w a6 Z5 V- T' b$ h8 y: Y- E
Education Accreditation, Certificates and Licenses: / g: k/ ^: D i2 H
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|