 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting + |4 g/ D" f" [4 |! ]6 o
Job Title: IT - Security Architect
8 d" H Z% P$ z6 j. @* x BPosted Date: 10/22/2009
) X8 W5 V6 J. M5 e+ H; [Department: IT-Admin
& d, u! f8 p0 k+ k* J; A2 ?9 FClosing Date: 11/05/2009
" C9 A, m/ S" VLocation: Calgary ) a& A4 e# V5 m, J* m
Full/Part Time: Full-Time , `+ s; B2 K N& r- N+ n5 v4 {+ P
Regular/Temporary: Regular
: `( H0 C# _& x/ d5 T4 n- O/ V" V7 X- Y/ j& j1 A( `" R& d, q
Job Duties / Responsibilities9 P8 h' v) r( Q" T# T
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
9 G7 b7 o0 F) _' o" Y9 o6 U• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
2 y8 h, m: M6 Z• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
9 C _9 z& r7 v5 _1 l4 D4 }9 S• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; + H- O: i1 k- @* ^2 h2 V' I! P
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
9 v: W1 K5 @: P% j' A• Share best practice opportunities and provide an industry experience perspective;
6 N9 n y! r/ o. }+ r& n) b+ i( K• Support and participate in SOX 404 compliance and Audit review activities.
9 r; ~ d o7 H. d# j$ ~' G! ?) c( o/ L3 w6 j
1 R* r2 N; N6 [* [# h, S9 b9 N
Education / Experience
# `- `7 T- a( o7 N( G; j6 H• University degree in the field of computer science or other appropriate discipline;
5 g- ~5 N& N$ P9 J& |• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; : Z$ K% W8 h& Y) L' _
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ; K0 B5 ?; r8 ?. u! m
• Excellent verbal & written business and technical communication skills; : U, Y3 U7 t! |5 a# _9 {& g
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
@% [% }' `3 `" y4 }0 W6 Z
/ d+ c/ p3 F8 ?. ~+ d( U+ oThe following experience would be considered a strong asset: ! M8 A. `. R: I" W: P
• Multi-tier computing architectures and middleware technologies;
5 J/ S9 [- P3 j8 @3 m) ]4 |• Web-based and 3rd party access authentication mechanisms;
3 ~+ M6 w: _3 O1 P: ]% o& g• Demonstrated technical and security solution leadership; " L5 o* R. o/ K/ b" E
( m* o, y3 a6 ]2 |$ X' u( j
Education Accreditation, Certificates and Licenses:
+ Q; E# r0 R% Y% e5 T& t) e& R• Possess or be working towards a CISM, CISSP or CCSP certification. |
|