 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ( a. w" }0 v) v/ U2 Y
Job Title: IT - Security Architect
) A$ p4 [& m& Z: L5 \Posted Date: 10/22/2009
$ E6 ~" W' j, n9 m$ ^( E, d4 }% yDepartment: IT-Admin
. m2 G& N, z9 x& ?/ V oClosing Date: 11/05/2009
# f" o5 R+ }3 ^8 R c6 y9 n$ iLocation: Calgary % v1 m; k, n7 d/ V) S
Full/Part Time: Full-Time ! d5 i7 c6 f/ F4 j3 Q' h
Regular/Temporary: Regular ( P& h. S# Z6 R A! l
2 v; ~3 R9 w- v. pJob Duties / Responsibilities
' k3 N: ^- F, v, X! K• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ) q6 K. ]2 b0 [3 F$ ]
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
+ v* a- A; J) ]• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ! f2 m/ c8 q$ D: T+ A4 q% j
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ! N9 g& B; t& t2 L+ U3 p
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ' P5 z& Y& H1 d' ^8 ~# G- k
• Share best practice opportunities and provide an industry experience perspective; - _2 v7 G4 n L' W! O
• Support and participate in SOX 404 compliance and Audit review activities.# W, P3 N k1 a7 r2 S& ]4 V
7 m! C/ n& w2 ~0 U% v0 R% F! F! {2 ~7 `/ B& L
Education / Experience
4 f9 B Z( O. F, C• University degree in the field of computer science or other appropriate discipline; 4 c$ M7 c1 T1 }+ [1 h' \" R. F W
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; % U" x! Q7 x+ ?% I( k6 n# D
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
- R- v6 E& l- B5 T9 u, h7 j# x• Excellent verbal & written business and technical communication skills; " @1 C* m4 @3 G
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
! h+ Y, t3 O% }0 Y1 k; Y6 a
5 I$ y& @8 c; Q# K4 JThe following experience would be considered a strong asset: & Z3 [, I( @. t
• Multi-tier computing architectures and middleware technologies; $ m% M" X; p1 U+ s1 N
• Web-based and 3rd party access authentication mechanisms; 1 J! e8 C% `9 F+ u' Y& v
• Demonstrated technical and security solution leadership; ; h- L0 i* m1 ]# n
; X6 W; p# o: yEducation Accreditation, Certificates and Licenses: 0 O/ q/ P& \4 ~8 c6 u$ u4 Y
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|