 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ) x; d; N; j! x0 y6 D; Z
Job Title: IT - Security Architect
2 I8 X7 {4 O7 P4 M EPosted Date: 10/22/2009 5 ]( w3 P ]- g9 \) i9 e
Department: IT-Admin 7 U7 \) C4 m* ^. n0 ~! y
Closing Date: 11/05/2009 0 o7 D+ y3 W7 q/ ~
Location: Calgary 8 S; A9 B0 h# L
Full/Part Time: Full-Time % A, Q* ?/ o- Y" ^5 Q+ }( v4 Q3 q
Regular/Temporary: Regular
5 o& j3 r/ r, k* _9 r! ]; ^, l2 w- j
Job Duties / Responsibilities
, I! b0 t1 r! H& l$ q- F% W: q• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; % @, W4 v3 s, O
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 7 N% o/ D8 d0 U2 D# s
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ N1 ]/ u3 w3 F3 f2 B3 w! O3 X2 F
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; $ r8 e; i7 t$ m
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
- U' {) Q0 D9 R' q- y- D• Share best practice opportunities and provide an industry experience perspective;
# k; e, f W5 K7 Z• Support and participate in SOX 404 compliance and Audit review activities.8 i0 n8 }) N: A/ h8 w" n
5 {: |/ Q# x$ A1 b% R, h
, F# K' T. X7 p2 e' J0 W
Education / Experience0 M) L7 j* H3 R* F/ j' ?# k H
• University degree in the field of computer science or other appropriate discipline;
! K3 H! W6 @# v/ ? l" `) y• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
; p' I! d) A) E3 K/ E7 |• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
; Q5 A9 \- D% a& V9 m• Excellent verbal & written business and technical communication skills; 4 D( A. F, U+ v! ]1 w) {
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
- E: p% h [- r; s; u; ]9 {
" ^: l) _/ H- X: E0 l5 g/ ?: MThe following experience would be considered a strong asset: : h# f; ?% L' m+ V8 c
• Multi-tier computing architectures and middleware technologies; o9 o: J, P2 J0 i
• Web-based and 3rd party access authentication mechanisms; 9 @: l& R g/ O. T' k/ ~
• Demonstrated technical and security solution leadership;
3 k! @* G. O6 y- n
3 I; b# J3 I/ @: n" JEducation Accreditation, Certificates and Licenses:
3 X( W \8 \9 p( t9 h; `• Possess or be working towards a CISM, CISSP or CCSP certification. |
|