 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting # ]& v; H9 u0 |' `/ F
Job Title: IT - Security Architect
6 a3 v8 { {' @. W( Z/ Z6 H5 k9 kPosted Date: 10/22/2009 5 c8 j L4 d: u
Department: IT-Admin ' }9 Y9 m7 R: w( W/ Q, o- W
Closing Date: 11/05/2009
7 ?, p" {, ]) t9 q0 ULocation: Calgary
3 W* `/ r( Q/ n! F5 q, O2 E1 J& CFull/Part Time: Full-Time ) {# n) w1 ^5 Y: O4 @
Regular/Temporary: Regular
' f; s1 Y6 L2 p) ~: P. J4 a
3 x( H: a9 v- I1 J9 s9 \Job Duties / Responsibilities. x2 d: a! R7 `8 W
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 3 \3 _9 a+ B. ?7 Y" b+ `1 ?. m
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 0 b0 c: S7 g9 i$ i4 h. ~4 C1 D
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 0 o+ `3 g' W/ N; U6 W; ~
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 e8 j7 O: u2 ^6 A• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
& f, A- h5 y. O1 b• Share best practice opportunities and provide an industry experience perspective; & D6 e4 | X } }5 T+ ]( |
• Support and participate in SOX 404 compliance and Audit review activities.
! J$ P; K( f) t1 z7 M, l' [+ L2 `' s; Q' b3 I# Q$ D2 M) G2 `/ h
, C% ^" L6 d; k- F9 `4 M+ ^6 I
Education / Experience
% X% `& d. U1 Z, ^• University degree in the field of computer science or other appropriate discipline; ' h B& N. [7 Y8 b
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
7 |, ~! V3 N4 _& n p• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ) S l2 |+ @7 f/ N! a2 i# X, k& X
• Excellent verbal & written business and technical communication skills;
& ` x0 \' e/ ~- d3 v: b" z) o$ Z• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
" o& B3 }3 A4 q+ [$ c: b1 N& s. I8 s1 I
- [. \3 R8 e( s* e) g" z- |6 y! \The following experience would be considered a strong asset:
6 v# }4 E$ y! K k, T• Multi-tier computing architectures and middleware technologies;
* G, J4 H' a3 K% O• Web-based and 3rd party access authentication mechanisms;
: D' I) `4 `$ N8 I" D• Demonstrated technical and security solution leadership;
4 b" A3 C. h3 }7 H
( T6 a1 `6 b3 K8 I$ M, EEducation Accreditation, Certificates and Licenses:
4 v% L: C3 j/ D. X _. r: M5 Q8 w+ k• Possess or be working towards a CISM, CISSP or CCSP certification. |
|