 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
7 u3 g4 O0 L8 I* TJob Title: IT - Security Architect
: c. X8 v7 b; j/ l h+ OPosted Date: 10/22/2009 0 m c% {7 |. S- ?, v
Department: IT-Admin ]! C" a, i7 T: ?# u
Closing Date: 11/05/2009 2 O, W* q) Q( }) e3 B3 b5 b4 K
Location: Calgary % B- Q) k; j; R* I. ~+ v
Full/Part Time: Full-Time
S {8 X5 \1 k+ ?+ g( l, ?/ b, QRegular/Temporary: Regular : v4 z3 g# X# G
+ Y0 c. `. I$ @: \7 H! u+ x
Job Duties / Responsibilities
7 [( J4 P* f* _• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 2 ]- | A' Z) E% D3 v8 ~( F
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; $ E1 h0 m6 L/ W- c! X7 f
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
( L9 J9 L- j5 L. B: [• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
! E9 I2 Z h% ^$ _. O$ |• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
: `- X- q5 O2 Y0 T! h; V. ~• Share best practice opportunities and provide an industry experience perspective; % R; c- u/ X8 `2 x
• Support and participate in SOX 404 compliance and Audit review activities.
! e8 ^3 H$ ?+ X0 ^: ^$ p8 S4 _9 h' Y. K3 [$ h) N$ g$ j
% @, Z( |( }0 x& zEducation / Experience" E! S5 H: E7 |' N: y- M# T- `9 _
• University degree in the field of computer science or other appropriate discipline; 7 F$ f F) b3 c. U' P, L$ |
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
/ w" e! J3 R" L1 n4 ]• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
+ l$ c+ E" t" V! W# N9 }• Excellent verbal & written business and technical communication skills; & R8 Q/ q* x7 e& \3 o1 u& `
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
) r- w8 W9 q7 w: u0 ]4 m4 u4 E$ d L/ s C* C
The following experience would be considered a strong asset: 9 u) b! m; X7 ~- q, Z
• Multi-tier computing architectures and middleware technologies; 4 E( @) S6 ]3 t, D/ Q' x7 N
• Web-based and 3rd party access authentication mechanisms;
- D3 a n4 K f3 s; E, f1 O4 L• Demonstrated technical and security solution leadership; 4 p1 R7 E) j6 B. I% T/ M' g
% \' N6 G; z/ k6 I; O8 W2 b/ d: d% P7 L& z
Education Accreditation, Certificates and Licenses: 5 C d3 o& h! I; Q5 S
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|