 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
) M( N& C8 k! X4 N- sJob Title: IT - Security Architect ' |( [- a" ]& ^3 N: {9 t! Z, D
Posted Date: 10/22/2009 ( S% D, H0 w% O# I* b
Department: IT-Admin
~; n# e3 J5 n/ O2 c8 w! y& {Closing Date: 11/05/2009
- Z$ ]* ?& G4 _& QLocation: Calgary 8 S8 d+ \ a& p
Full/Part Time: Full-Time
, l, _. q6 u0 o+ w2 \. J1 [# ERegular/Temporary: Regular
- F8 I }0 o. w" ^/ ?) t: K: W% e" c( q; t5 M3 R
Job Duties / Responsibilities }' y7 A+ }- c8 P( i; X$ h6 n' G* a
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
. Y& B1 k/ j4 t, l! u6 @• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ' y1 V+ f4 |( V/ k0 i
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
* Q2 p+ D U" ~$ J" v2 Q) T• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
2 e' |2 z6 a7 ^8 g; C0 A• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
& ^9 ]) G7 i2 L b) j1 n( I• Share best practice opportunities and provide an industry experience perspective; - C: p% M/ z9 M: k* t9 K
• Support and participate in SOX 404 compliance and Audit review activities.( ]& F3 S, W! a& Y3 o" B
2 ?3 {& A, H& z# T: h5 _) t
; G! W, P% s+ K [
Education / Experience4 ?3 W: S% z7 b0 I1 {( `* G. s
• University degree in the field of computer science or other appropriate discipline; 0 h7 r* x$ ]) g! S/ T
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; " a, h' {, V7 m: v% I1 U+ w& u; ?
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
0 x q! k# m% N$ s• Excellent verbal & written business and technical communication skills;
( f! m* z: }" S, a+ u3 r5 J l- q• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. $ O/ r- l" R6 f- b
, A' c6 S6 v, ?1 L/ BThe following experience would be considered a strong asset:
4 N$ S% H2 Z4 u% X% V2 m• Multi-tier computing architectures and middleware technologies; 8 K9 a0 f) N" { `' N
• Web-based and 3rd party access authentication mechanisms; 2 O) V7 H1 r6 A1 h' O
• Demonstrated technical and security solution leadership; 0 N* d" G6 X6 E
0 k, i! N. A! _* R N! t. z/ _
Education Accreditation, Certificates and Licenses:
3 I4 e$ V+ `) i4 F) L# t6 {• Possess or be working towards a CISM, CISSP or CCSP certification. |
|