 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting V4 |% f" b% v9 {5 T
Job Title: IT - Security Architect
% ~" m. m, c/ T) q( c6 cPosted Date: 10/22/2009 5 }* a) l: z( n% `- C1 C4 q
Department: IT-Admin
2 @. X0 a& }5 @/ v. C/ }Closing Date: 11/05/2009
' n, a7 |5 H8 i/ i. I9 H5 W3 PLocation: Calgary ( @2 K( C: Q+ Q8 O0 X
Full/Part Time: Full-Time
7 P" c; ^7 Y2 R' n$ Q/ M: t4 ERegular/Temporary: Regular
9 M! {9 D% A" |$ [9 }& f; t1 \9 \! t y
Job Duties / Responsibilities) Y+ o% s2 r5 c$ K* ]& H3 e' i
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; $ R4 J* B* @" T1 L7 s
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; : ? m* m- g: d7 N9 N$ w1 W
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
/ ` A" U. \' L3 y* c• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; . r4 {6 z3 Y- h% C) l6 A
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; * y& r. k4 q5 ~, P9 U# H# \2 s3 C
• Share best practice opportunities and provide an industry experience perspective; ; h8 M. f+ a/ C4 ]" |- s; f1 c2 @/ Y
• Support and participate in SOX 404 compliance and Audit review activities.
4 D9 x E: B8 }. \, Z0 w" ^9 z3 \3 h+ S. Z& d
) [/ P& o& }. V2 IEducation / Experience& c8 ]4 n! t$ |. c7 I7 D8 [: R
• University degree in the field of computer science or other appropriate discipline; 8 y2 p+ M8 Q8 C+ ^2 ]; I& H; B: H( g
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; # X6 T5 S: f. e; @9 G. h( U V, o
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( e- i3 D, O/ p; h" n; M" C# x3 W! Y6 ?
• Excellent verbal & written business and technical communication skills; 7 w( ]+ E( U% T
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. # V4 R# g; G; {0 a: A0 M7 K i
3 s5 v. B$ m" K6 ^4 b: [
The following experience would be considered a strong asset: 0 T5 U* }2 e% u5 A/ ^# I
• Multi-tier computing architectures and middleware technologies;
4 D3 ^# _- g( u( \ G4 O7 G6 ]• Web-based and 3rd party access authentication mechanisms;
, E ?4 [( L) a$ j J0 P• Demonstrated technical and security solution leadership; " i2 z! o' N/ O! P, [5 J" w1 p
' g1 G* n. Z0 lEducation Accreditation, Certificates and Licenses:
4 T9 Y, a0 }; }+ {5 \ i4 {8 o• Possess or be working towards a CISM, CISSP or CCSP certification. |
|