 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
6 N5 W, G" f0 T' ?4 LJob Title: IT - Security Architect & q* O& W L$ [% O
Posted Date: 10/22/2009 ) w# U( B+ D8 C9 ?4 e9 M
Department: IT-Admin ( h6 t- z$ u. `: A1 P/ y& E
Closing Date: 11/05/2009 + g9 q+ Z) T# p( D4 }3 v' E0 J6 g
Location: Calgary
& x/ H+ l+ F4 ?Full/Part Time: Full-Time
2 b3 ~- S( X' H2 GRegular/Temporary: Regular
- `* }) C& ^) {+ b) I: y! Y0 g' o f: D2 L2 n( ?& {/ n
Job Duties / Responsibilities. @# P6 W& ]/ O$ ~; P0 W& l0 {
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
5 B7 u- b9 H+ P8 S5 `• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
! d6 k" _4 ]2 D v• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; / V3 V6 L3 a3 R& C! I R
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
) |3 _8 ^! g o3 s• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
: D3 [$ w/ x1 ^2 r. a• Share best practice opportunities and provide an industry experience perspective; 0 E u+ V/ z G% x
• Support and participate in SOX 404 compliance and Audit review activities.5 O0 ] A- T3 a7 }
* D0 r1 x0 p! \/ @
) A( u+ G, W: Z1 b8 E+ d1 ]- |
Education / Experience
. @# F, Y6 [8 t3 Z* W• University degree in the field of computer science or other appropriate discipline; % v. k5 x0 W& `3 p- c
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
. `. E" [$ S) Q. v7 F• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ( O, B* s& P3 t! p4 {" m* C/ u
• Excellent verbal & written business and technical communication skills; / O* I( g; j9 s) p
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
# O( `. F8 _* v$ M3 Y6 ]& h: `2 [( M
The following experience would be considered a strong asset:
, ^; ?3 ~) B. z• Multi-tier computing architectures and middleware technologies; 2 V( W) B% M3 \9 [' ^: D
• Web-based and 3rd party access authentication mechanisms;
) \, [& S8 j0 y% [: F- n• Demonstrated technical and security solution leadership;
# x/ K3 V! |1 N9 J9 c) c ^& ]1 i% K+ ?# Q2 [- _! Z0 W/ j ^- `2 c
Education Accreditation, Certificates and Licenses:
7 d+ m6 E9 _. m( M; ^• Possess or be working towards a CISM, CISSP or CCSP certification. |
|