 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
' u. X6 h: N; u8 ] `6 E$ tJob Title: IT - Security Architect $ s, a" s- v5 t& P4 \& }
Posted Date: 10/22/2009 - }8 z3 k( q; r4 ~, H8 ~
Department: IT-Admin
) D+ E) A( w9 J( mClosing Date: 11/05/2009
: W7 Z8 C \ M6 d4 ]# WLocation: Calgary
0 v0 D, S+ a- i0 M F2 a6 dFull/Part Time: Full-Time
+ H9 J1 Z4 {& a4 f" hRegular/Temporary: Regular
3 ~1 H1 g7 \' s9 `: H/ F8 m3 [3 Q- Y. _# d/ ^+ l! P! L
Job Duties / Responsibilities
; d8 ]: X- I( S• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 [* A! r3 t; `+ P
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
0 g% Z! E4 Y2 M+ n7 a" i• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" T' J: f' Q# ~& ? z _• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; * U3 _' F+ i5 e O- `
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; * m. @& t6 T" H3 g
• Share best practice opportunities and provide an industry experience perspective; : ]# O- U: L3 W5 y% s. U( ]0 Q# Y
• Support and participate in SOX 404 compliance and Audit review activities.1 _3 d' _9 {/ {2 \4 L! m8 O
2 c* n4 I3 N$ O" J! ]
# s2 H- p) W, A! C4 JEducation / Experience
- u! F0 X O; M* B3 S• University degree in the field of computer science or other appropriate discipline; 4 A' S2 E$ u: I* E0 B2 C
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
( e* O/ E( R7 M) n& N$ R• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
7 Z% @6 j. P! S+ n3 \# |' o0 v• Excellent verbal & written business and technical communication skills; 7 ` Z9 |; M/ y# g' z9 a% ^
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
& E$ m O' z w: l1 z4 G
" W4 j* b$ v6 i+ v9 U' gThe following experience would be considered a strong asset:
/ C- @, ~4 u( \/ H4 W5 b. y: X% Q, k! G• Multi-tier computing architectures and middleware technologies; $ ?" u- S1 p. d4 Z9 T3 K
• Web-based and 3rd party access authentication mechanisms;
' X' L- R. a% D• Demonstrated technical and security solution leadership;
?. `: _# p0 x3 E1 R7 K
6 e" s1 A1 e1 I- ]8 pEducation Accreditation, Certificates and Licenses: ; z) P0 J7 V! a# ~+ ], }
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|