 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 1 Q- e) m" O' n0 y& \
Job Title: IT - Security Architect ' K7 ~ b/ h' M4 P/ N" p( O- b
Posted Date: 10/22/2009 $ J8 ~7 F" Y: X$ g
Department: IT-Admin 2 @# F* k4 Y- S6 m; n( Y s
Closing Date: 11/05/2009
# q7 l$ q# ?+ E9 t* n" JLocation: Calgary ' I$ ]5 J# u: C3 o* E
Full/Part Time: Full-Time
7 _, M" p" |# L r6 m( rRegular/Temporary: Regular
6 q& }* a+ f o8 h7 H3 Y! E: F; g3 R, k2 F4 C$ D/ K3 g
Job Duties / Responsibilities
/ O# I3 L" S2 B• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 8 k' U4 U9 b3 H5 w
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 7 K+ b& m# W7 S' U& {
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
, v8 \! H, O# B• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 8 c4 L3 o5 f4 W g* U3 p7 l6 m' P) \
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ; n& {! ]% C0 R/ ?
• Share best practice opportunities and provide an industry experience perspective; $ }. y7 f3 G5 \
• Support and participate in SOX 404 compliance and Audit review activities.
- s s2 Z h( c4 i6 [& S& w( B+ [1 Y. R, L
& ~# F% n$ I, H8 oEducation / Experience
l' e) @' O9 {• University degree in the field of computer science or other appropriate discipline;
" ?4 e0 I9 Y ^, t# C6 X• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
/ x# K+ I& U, s m- q* Z/ L• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; " f7 \3 G5 r" E, [
• Excellent verbal & written business and technical communication skills;
; }; d9 ^( {' V6 X. ~• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ( S8 f" ~8 ?( |" Z
! g& s: t2 V4 B, k' U8 d9 SThe following experience would be considered a strong asset:
% e" |5 I% ~7 q/ O; H; L$ z% v• Multi-tier computing architectures and middleware technologies; $ o7 P, X9 D' N6 V! M% E
• Web-based and 3rd party access authentication mechanisms; + u/ D! L; L6 I
• Demonstrated technical and security solution leadership; * K3 n/ e# Q% u( N+ f
/ H- W7 |5 u, E" A1 cEducation Accreditation, Certificates and Licenses:
" s3 y0 B2 Z4 u/ F) X7 n. x# Z• Possess or be working towards a CISM, CISSP or CCSP certification. |
|