 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
5 B3 p. X1 R6 A& _! JJob Title: IT - Security Architect ( z5 x0 r) W T" L9 ]7 g' J* s
Posted Date: 10/22/2009 3 u7 I6 d4 J- V
Department: IT-Admin
. `( v6 T. q. v) h2 V VClosing Date: 11/05/2009
1 u* Z+ s$ s; T8 x, F* LLocation: Calgary # S( x5 X8 `% a9 C7 Z. e f
Full/Part Time: Full-Time |( V6 ?5 U: `# s/ G% C( I) g
Regular/Temporary: Regular 6 {* w% X S- M# y) |
: U! v7 l |7 U, ]2 j& l
Job Duties / Responsibilities
9 R& X) \ l( N( E3 }! A& e$ B: s• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
! @" s+ D( p- v, o; R' w' |• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
6 z$ b l+ t" M1 f# f0 ^1 M• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
* V& r6 j5 b5 y& _% `& W• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
2 I9 N. u _! E8 d• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 8 `7 d' | b: B2 r
• Share best practice opportunities and provide an industry experience perspective; . E& _: e( v# {; f7 G
• Support and participate in SOX 404 compliance and Audit review activities., Z* C. g1 F& P# ]$ N( H: j5 `$ I& q
4 E$ q3 u6 q+ C
g* o/ X& r7 SEducation / Experience0 p8 m- L; `' g; T4 ?
• University degree in the field of computer science or other appropriate discipline;
, Q" E: B4 H- \3 N0 P2 `5 ?• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
g2 C% v5 H% f9 e• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
9 E* G$ Y& ^* D" u$ P• Excellent verbal & written business and technical communication skills; ! _) a4 @% d& f0 k5 a
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
% ?- ^& p# A7 [" | A6 r% _ C5 ?# J- f. C$ U, P& [
The following experience would be considered a strong asset: / y+ ]3 d! c: r0 _, p
• Multi-tier computing architectures and middleware technologies;
" O7 U5 d" t* M7 M/ Y8 w• Web-based and 3rd party access authentication mechanisms;
' q8 C. u7 N- }• Demonstrated technical and security solution leadership;
& j8 ?) B3 K, u' T$ a# I. B4 q* S! R) q& y) F& `
Education Accreditation, Certificates and Licenses:
9 H0 \8 S! A, N0 P8 P• Possess or be working towards a CISM, CISSP or CCSP certification. |
|