 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting + ~3 c( f& W5 h( p! b( Z
Job Title: IT - Security Architect
. l6 J# @ s* Z! J& o7 |Posted Date: 10/22/2009
5 P# U7 R# O4 r0 _/ t* gDepartment: IT-Admin
& Z" l1 r M! l# NClosing Date: 11/05/2009 * k @) y4 V9 ^3 [- ^1 }# s
Location: Calgary 6 b( [" N( @2 Q; ^1 F' A
Full/Part Time: Full-Time 3 ]4 m2 T- F# O0 C% a
Regular/Temporary: Regular
& I( ^0 Y! O$ L3 B, \# \! s! x- Y$ _) V* W
Job Duties / Responsibilities# b& S* b) Y* S/ D
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
8 F" F& Y# f& e+ p+ E• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 8 p, h) b- y+ g2 e; ?
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 8 X, V9 D7 N) Y! [, S: k* T
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ! e9 J( r: E8 ]. K' ~$ a
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
. j+ }5 s H& e# D& C* z1 Q7 ~3 A• Share best practice opportunities and provide an industry experience perspective;
) T7 _6 \! n# n) j( P• Support and participate in SOX 404 compliance and Audit review activities.) o# M: p& A6 ^6 r/ R" P& d
0 S! h; P- c) A) L" ?8 K9 s
; E* i) {! z1 R/ [& l; fEducation / Experience8 P% f- R" _# ^! h( y# D
• University degree in the field of computer science or other appropriate discipline; 3 }2 }0 ~3 X0 i7 Z$ l* ^4 L
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
( @6 c5 o' R( @3 e1 d$ X3 N• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
: c' @/ f# K$ `# F1 X: E, ]! q: }• Excellent verbal & written business and technical communication skills;
: C g5 q9 s8 u7 t" w# w8 ^! T' O* z" n• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, v7 K) Q- q' R1 k6 k1 |# c: G6 z
3 h" S0 @8 y- {) x E, KThe following experience would be considered a strong asset:
3 v0 R& t- s' u• Multi-tier computing architectures and middleware technologies;
$ G+ ~% U2 E. G" _ r• Web-based and 3rd party access authentication mechanisms; + T# _ Z3 j! K* M3 h3 y2 V
• Demonstrated technical and security solution leadership;
* L/ W% G4 ?3 J, V, x, w
2 x: [ e$ H+ w+ v* y$ K" sEducation Accreditation, Certificates and Licenses:
* K G& u" l2 K& S& Q! _3 v ~• Possess or be working towards a CISM, CISSP or CCSP certification. |
|