 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
& t: t+ t4 W4 K- j2 J6 s. nJob Title: IT - Security Architect 4 i* m, J N9 [) S6 ]0 _
Posted Date: 10/22/2009 $ N% ^ e: ~ k- p0 _1 U
Department: IT-Admin
$ _% h. w" W2 jClosing Date: 11/05/2009 - s% L5 e+ ]/ E( A0 l# g
Location: Calgary
8 q- G* R2 ?3 i% O( m( _Full/Part Time: Full-Time 2 Q4 A. E: ]7 c' X7 q
Regular/Temporary: Regular . t1 K- S. h8 u% @: F. V
# S- O7 ^$ I' }& i L, ?
Job Duties / Responsibilities
2 t3 n! X6 [0 w6 n( Z: i7 g" p! P• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
+ j, T- I# e# r7 v1 b' D( d$ d• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 6 j [/ M) m* J- [$ Q
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 8 a, C1 k3 m( D1 ^. m5 y2 C
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
2 S( {6 b2 k1 F C8 u• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
) m2 d% }2 h- J- v• Share best practice opportunities and provide an industry experience perspective; 2 t: z y7 M) x
• Support and participate in SOX 404 compliance and Audit review activities.& l" G L! @6 G9 o
7 A- _% z* H( ?3 j& v, s9 F# B! k$ u8 |$ r2 z5 ]' d0 t' m
Education / Experience
% |1 R8 G8 o' ?) I3 g! K9 e• University degree in the field of computer science or other appropriate discipline; ' W1 E0 _8 s$ Q; m' {
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ! x) [) B/ f4 a
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 4 k( J7 X7 s5 S: K5 y5 c) ~8 }
• Excellent verbal & written business and technical communication skills;
2 t6 D$ v7 V# B2 _" I% ?+ {1 O• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
/ m3 _. }% b( v! O& f( t
" g( C* L i& bThe following experience would be considered a strong asset: ( w, Y1 U2 \. S2 _8 f k: w# ~
• Multi-tier computing architectures and middleware technologies;
6 I7 P4 a0 j8 m% U0 Q- F; t6 n• Web-based and 3rd party access authentication mechanisms; 0 [* l3 L R! e
• Demonstrated technical and security solution leadership; + ?5 f: o* y) R- t4 M
: S7 I% y3 k: e/ [" OEducation Accreditation, Certificates and Licenses:
# G2 q Y* S/ Z( Q0 U, g2 U1 s/ j• Possess or be working towards a CISM, CISSP or CCSP certification. |
|