 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
) X: Q b+ O9 @6 j4 pJob Title: IT - Security Architect ; O) g7 @. e; e7 P9 a
Posted Date: 10/22/2009
/ i" q" p0 f# I8 _! Y0 m! uDepartment: IT-Admin
# E6 J4 Q M1 gClosing Date: 11/05/2009
/ h2 g& C, T6 x+ bLocation: Calgary 9 {! v# E3 t/ \4 f+ x
Full/Part Time: Full-Time
1 l4 Q& l! @6 u5 YRegular/Temporary: Regular 2 A7 x2 ?6 `( _+ E% {. f' P0 l
0 T: h' G% ?2 s! I: t* c/ qJob Duties / Responsibilities
$ g; s0 q6 y- J+ f$ F. A• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
1 G: E4 w& J: f, B+ [: W! N• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
: w8 X! A1 X. Z0 r. Y• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
. Z i: c6 f, V0 L# ^+ q• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; $ \4 j8 U: E, k, ~, W
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
0 T* ^* ^) g8 ~2 h% k8 `* n; b• Share best practice opportunities and provide an industry experience perspective;
0 P* n4 {5 h# y) J6 l$ k• Support and participate in SOX 404 compliance and Audit review activities.
9 H2 E; f2 U( x- Q2 p5 n5 T
4 o9 }8 G! y. B' e0 X$ `6 t3 B, u
Education / Experience) Z7 T3 E+ b! a
• University degree in the field of computer science or other appropriate discipline;
5 W" \8 S9 f% {8 Y6 t) ~• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ) X, w; {. A1 N% w# C& z
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; % Q$ i) S- ^0 n/ t( F
• Excellent verbal & written business and technical communication skills; , i$ G1 U: P. H8 N
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
9 I. D! b1 [& N7 W6 R9 O3 }0 k4 h! S& z% w! u
The following experience would be considered a strong asset: , V$ T7 c. S* f, c$ b5 A+ W/ W& z
• Multi-tier computing architectures and middleware technologies;
' X& Y/ |5 l& z9 R• Web-based and 3rd party access authentication mechanisms; 0 t' E9 M3 C% A: k/ X
• Demonstrated technical and security solution leadership; 9 H: ^9 j* J E. E- ^: h
2 j8 |; t+ S8 [0 O. c; gEducation Accreditation, Certificates and Licenses:
3 w% w; R; P5 W: [ W# d9 C$ S4 {• Possess or be working towards a CISM, CISSP or CCSP certification. |
|