 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
& g9 ~9 N1 ?0 y3 J7 S" d' z7 XJob Title: IT - Security Architect : ` q! {2 d+ V. Z8 ^' O" q" w! I
Posted Date: 10/22/2009
) p( s/ w7 x5 ~& u+ s5 e7 G0 qDepartment: IT-Admin . ~* V9 ?/ C. X: D
Closing Date: 11/05/2009
; F8 N5 ]6 l% w' Q$ A) r7 SLocation: Calgary 5 V7 Q' [+ V# J0 g
Full/Part Time: Full-Time
( q: C$ N/ {/ f3 IRegular/Temporary: Regular
9 A. J) ]3 h; t6 Q1 ]# B2 e" @" l6 W/ ~; \5 y m6 G- M
Job Duties / Responsibilities, F8 l" }' k: ]* p- @" m" c
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
3 X, M, b$ \7 e• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; : B# w$ |5 l5 u: p) h( E2 v
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ! X4 \. Q1 g i7 V, |# U
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; " X; O1 v k2 N8 y+ w/ p
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
6 E% Z( o/ i3 n$ a4 i• Share best practice opportunities and provide an industry experience perspective; ( N9 ?; o3 p1 X- o0 a* H
• Support and participate in SOX 404 compliance and Audit review activities.& e" Q4 {1 s, E& ]6 \: @
0 i4 w9 b2 ]6 ~6 z6 ~/ W
( v6 Z- d2 b1 j$ A" R' |3 X
Education / Experience# i/ c! j- l! S( w0 D
• University degree in the field of computer science or other appropriate discipline;
: e5 G" m# p) B* Z/ F4 b• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
1 G* y" q/ X+ A• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ; t* O2 G1 g2 ~- c3 }! w4 F
• Excellent verbal & written business and technical communication skills; " e# b- C( @, v& l! O; j5 E
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 0 T! \* C8 R9 ?0 R! s4 \
. ]2 E! g8 Y# a3 W* u5 U tThe following experience would be considered a strong asset:
, W2 N/ v# H# t! [• Multi-tier computing architectures and middleware technologies; 2 g( q% O% i0 |! ~
• Web-based and 3rd party access authentication mechanisms; 5 o, x! S$ s# O: R; \
• Demonstrated technical and security solution leadership;
5 e2 W1 S. }" c ?% P4 i4 r6 E5 W% |8 E
Education Accreditation, Certificates and Licenses: + O6 ?: L* | [6 ?/ w& @
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|