 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 3 O; V; m" _$ O8 O$ K+ x
Job Title: IT - Security Architect
5 B( w ^' X- R, O+ Q9 }9 QPosted Date: 10/22/2009
& K7 i4 q( W3 b/ ?) R3 j/ xDepartment: IT-Admin 7 e4 E, }% I& N; M: P; d
Closing Date: 11/05/2009 ; w" i9 n" N# M! f' t& W
Location: Calgary
6 _ `, F( _ g: @6 _Full/Part Time: Full-Time # }0 H, K6 c( ~- G9 G
Regular/Temporary: Regular ( F3 i! ~* |1 G% t- h
) [) b! U4 Q; J, U& c* sJob Duties / Responsibilities
2 V6 V3 M$ c, [4 Y• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; - Y! j i8 g0 B3 n
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; : f! D- f& f+ u; q
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
' E4 ?2 ^* z! `/ O) [+ w8 }3 |• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 2 z: d7 S* u) h5 |+ x) _0 u
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; - M7 c$ l% A: r9 w* U
• Share best practice opportunities and provide an industry experience perspective;
8 w2 Y* n# x" H• Support and participate in SOX 404 compliance and Audit review activities.* b4 L; k" l1 E. h1 i+ m% Q: k
Z' M/ }2 G. } c0 Z Y
) `7 [& V. ~3 L9 S' |Education / Experience
. {6 ?7 R' w6 R3 ]• University degree in the field of computer science or other appropriate discipline;
6 S, [ R, X* E* X2 {( j% z) F, ?8 F• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; % i% s( Y" b! t. p! m
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
. o+ S A/ G5 U6 A a: Y( b• Excellent verbal & written business and technical communication skills;
- L3 L; o4 l" y, x; ]: U& ]7 t7 ]• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. : F" j% B# a" h4 ~9 j
) k x( X v( g' o+ g/ o; h
The following experience would be considered a strong asset:
w3 i! w) a* k' a• Multi-tier computing architectures and middleware technologies;
/ Z) r+ R" S! H8 J& R; d( ?, g• Web-based and 3rd party access authentication mechanisms;
% j# n6 M6 E( U6 M( P• Demonstrated technical and security solution leadership;
# S% K) D7 |- v5 i& ~& `
( Y8 P! e; w+ ?( B4 T. X+ G+ h2 J) ~& QEducation Accreditation, Certificates and Licenses:
: Z3 F7 f- @! p6 O; J4 \• Possess or be working towards a CISM, CISSP or CCSP certification. |
|