 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
% T3 Y3 c5 w. e4 I6 rJob Title: IT - Security Architect 6 e* v; L$ @/ ]0 A6 t1 n
Posted Date: 10/22/2009 6 o2 d$ H+ F4 p& L7 q
Department: IT-Admin
% s) V. t# r5 n# k; @Closing Date: 11/05/2009 R1 o7 V& C8 j
Location: Calgary
4 v; O. l4 ?9 B w7 H9 RFull/Part Time: Full-Time . F' _6 X( l8 P5 d2 C v' ]+ I- I
Regular/Temporary: Regular + C7 b; f [, @/ ]' b' r
( l7 O T+ H5 E' x/ k/ d5 z5 T
Job Duties / Responsibilities8 z4 F+ e+ G* `1 @( v, a, n
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
; k. E) m/ p; V) O( M0 W• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; $ a8 E. Y- U/ ^4 \9 [! l6 ]
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
; a1 `2 C$ g$ \3 @* r: C• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
- w4 \- I% m/ `' | c: o9 m, l2 |• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 5 j7 @! L4 m8 K- L. w
• Share best practice opportunities and provide an industry experience perspective; 5 W' @, G" z! I9 u' @6 A
• Support and participate in SOX 404 compliance and Audit review activities.
* I* X2 ^& c) K+ m! S% x/ v8 }0 ]
* J" C- W( s3 p% k0 v
3 Y! ?3 {( N, D% X2 T/ k' h: Y$ ^Education / Experience
: c+ O1 b4 ~1 k$ U+ _* e) [• University degree in the field of computer science or other appropriate discipline; . i" W" U" w! r# f! I# `0 N
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 2 L" O' r: m$ j0 \
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
! Y) [) c0 @. q# w• Excellent verbal & written business and technical communication skills;
, d$ h3 o0 c+ J7 o/ g• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
9 B7 C9 V* E. |3 D) `: y
( |9 ]6 {( E _0 ^The following experience would be considered a strong asset: - x- ?, M: ^7 @9 s' y+ n& R6 N
• Multi-tier computing architectures and middleware technologies;
9 ?: h% ~+ Q6 N ?& Z• Web-based and 3rd party access authentication mechanisms;
' R$ h8 ^1 Y1 X• Demonstrated technical and security solution leadership; 1 L; b& j9 i. e6 L
1 `+ F) C& W4 T$ C% _( n- R
Education Accreditation, Certificates and Licenses:
# E* w) @' u' j$ H• Possess or be working towards a CISM, CISSP or CCSP certification. |
|