 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
, Z* i4 n# Z" B( C; O- |7 o2 AJob Title: IT - Security Architect
% X: B+ r' R; zPosted Date: 10/22/2009 * w F4 m# L# _0 \+ q7 J5 n2 O
Department: IT-Admin
6 l# `4 g8 Z' X' o6 V$ ~1 OClosing Date: 11/05/2009
. i7 N) P h) e+ c: u6 GLocation: Calgary
' }# G' Z8 Y5 D4 U" S- C$ kFull/Part Time: Full-Time % s$ [& g5 z; s5 v P( [0 {
Regular/Temporary: Regular 5 D8 m$ V9 B- @' ^5 [ k
+ u. O2 b+ Q+ @, v( |Job Duties / Responsibilities- Z/ [3 N5 o. G$ J7 I [
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 2 I b, y4 Z7 C. o
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
3 V) p# ]- l+ J/ B• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ' c; {- _/ O' o& U0 O$ G
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; - H$ @' C5 u" d0 L) j' b
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
8 e! V4 _, k4 h) J) [, z/ h• Share best practice opportunities and provide an industry experience perspective; ) T1 t8 @/ {1 K# [- A0 g
• Support and participate in SOX 404 compliance and Audit review activities.
# Q, z L* D0 C5 C5 d0 @" C9 J& V4 O+ Y6 P) |
3 u |, {& V8 D& U( Z) EEducation / Experience
$ d, ]0 j5 H% M8 S1 o• University degree in the field of computer science or other appropriate discipline; 4 j0 B9 e( H" F l
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
% C* b, U" h0 G( T8 Z* s• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
" E" @, }& @4 `9 t7 P v/ E• Excellent verbal & written business and technical communication skills;
0 B8 e. j/ }8 O: F$ Q• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ! Y4 C$ v7 X4 L0 Q1 Z9 ~2 H" j
: @+ q3 t6 B+ h, M+ T3 l" n* EThe following experience would be considered a strong asset: + j+ S& h9 |+ `0 D
• Multi-tier computing architectures and middleware technologies; . p; X1 u8 D! k/ c- X
• Web-based and 3rd party access authentication mechanisms;
$ M5 Q& J; l* b' m• Demonstrated technical and security solution leadership; 7 L1 |& `/ `* I' \+ S& b( e
; _/ N- U3 O3 CEducation Accreditation, Certificates and Licenses:
, D( i9 G# D4 \6 w- ^. Q+ t* a• Possess or be working towards a CISM, CISSP or CCSP certification. |
|