 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 9 v- r$ I) e9 N4 `
Job Title: IT - Security Architect
$ h" T$ I* u* g3 W+ HPosted Date: 10/22/2009
2 {% C: R! K1 U8 A4 v# r/ SDepartment: IT-Admin 2 M9 \5 ^0 ^* o3 c3 b# Z
Closing Date: 11/05/2009
- A* R) k; a6 w: F+ ]Location: Calgary
" A' ~/ Q' a* W' l; l; R" p# ?8 VFull/Part Time: Full-Time , q: a" S: U8 j
Regular/Temporary: Regular
# N+ G" l; C( t) [- j8 g3 U6 R2 O" }" k9 N7 E" H6 d) q. `
Job Duties / Responsibilities- L) q: \" C8 [
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
. \0 ^# f5 W' Y# R" ^, i& v• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
( s8 C7 I @) J% C! g* Y) U• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 6 ? `" k) k+ m! X
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
$ N" ]1 q0 I" y& \4 d2 m• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ) p: g. G E% r* u( w) Y
• Share best practice opportunities and provide an industry experience perspective;
6 p# |* {: |0 ]7 s0 [• Support and participate in SOX 404 compliance and Audit review activities.9 G! v% x4 T2 b8 t5 K7 k+ y
: ]# D+ P* e3 m$ y. U
. J7 s3 i$ V+ p; H8 o8 n
Education / Experience5 P' R9 r8 `' ~4 } n) d, u. ]
• University degree in the field of computer science or other appropriate discipline;
0 a) o- Z& r: o; @# d6 J% o" s# c• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
! `+ h5 r+ _) ^1 ]7 y5 d9 `' M7 T$ U• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
" m0 Q( t( Z( ^3 p# I" }' j6 ^+ k• Excellent verbal & written business and technical communication skills; 0 u+ s7 B: \& p& q- ^
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 1 u1 z5 o( A7 w; ~
( a+ a& u/ }, ?! AThe following experience would be considered a strong asset: # |, M4 c) C* F$ t! L3 _; S
• Multi-tier computing architectures and middleware technologies; " x6 y- T- G* P( Y W2 x, C
• Web-based and 3rd party access authentication mechanisms;
0 t/ s: P8 ?( d6 l3 j! @! L• Demonstrated technical and security solution leadership; k' i* z; G# N
5 Y# a5 e+ n0 KEducation Accreditation, Certificates and Licenses:
' S: i) v( b/ w0 E• Possess or be working towards a CISM, CISSP or CCSP certification. |
|