 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 4 Q6 M( i* N/ ? j. J/ d6 l/ f
Job Title: IT - Security Architect 4 y M$ H! u6 [- y
Posted Date: 10/22/2009 0 Z5 [! b) ~, N
Department: IT-Admin
$ X8 w, D& ?. h3 S0 ~Closing Date: 11/05/2009
" Z6 b6 V/ `0 k: I7 u) k0 r- jLocation: Calgary
' c9 u1 M" N0 pFull/Part Time: Full-Time / Y6 u+ ?' G# i8 N1 W8 E
Regular/Temporary: Regular
" j6 h% O6 Z9 x2 h+ U' U6 x' n' c d0 S
Job Duties / Responsibilities( N+ N, P* v, D
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; + f, c# u- F: E8 D
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; $ v. v9 a8 E0 b& b. J: J, y ^0 x
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; - U: Z; d) ~2 v+ @* Z$ o6 S
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
* B! J8 V* j* `0 O• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; & N8 g2 E7 g: V F C, N, A
• Share best practice opportunities and provide an industry experience perspective;
' j0 S9 m y% p+ N: U% H• Support and participate in SOX 404 compliance and Audit review activities.
# c" R( @5 p8 F8 j+ g/ }9 P6 Q. W
! [ l9 o4 H* Y
9 G# ?3 d: Z5 \* M2 R3 dEducation / Experience$ k9 J* u/ \9 H$ h0 r
• University degree in the field of computer science or other appropriate discipline; % D) d6 t7 |2 J
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
' y7 X' [0 _" m/ j8 M. ^• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( c7 W- [) t0 m
• Excellent verbal & written business and technical communication skills; 2 Q) R+ @7 B3 s/ D
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. + L# M; P& \# P# R- _7 t$ Y% U
$ ^& Y6 D& J, g1 d' C* b
The following experience would be considered a strong asset:
0 |7 i" v$ c" b0 p• Multi-tier computing architectures and middleware technologies; : q U% B8 E, [; p4 ?/ }6 M) v, f3 F
• Web-based and 3rd party access authentication mechanisms; . z1 s! X- p5 L% D: ?
• Demonstrated technical and security solution leadership;
+ c; J- w6 U, ~" |# j/ g# j2 l1 [) S# x2 I5 `2 Y% V* C0 c
Education Accreditation, Certificates and Licenses:
/ K/ \- m6 S$ G• Possess or be working towards a CISM, CISSP or CCSP certification. |
|