 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting * R4 t% O- h7 R
Job Title: IT - Security Architect
3 _5 P: y6 d: k+ w$ R. HPosted Date: 10/22/2009
' n; o5 [) d$ c5 t* V. }Department: IT-Admin 2 ^& `- {; _, v% H7 g
Closing Date: 11/05/2009
5 X1 @/ l5 S& Y/ K' f0 Z. k/ [% E2 HLocation: Calgary
5 r0 `7 |: M& b' G$ }5 O; }# e0 eFull/Part Time: Full-Time ) G: n1 ~' r; K7 B0 R- b
Regular/Temporary: Regular 4 J# l: Y4 Q7 n! i; X
/ i- }. B0 h l6 N$ {
Job Duties / Responsibilities6 U1 l9 @+ P. ]+ x0 x
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
! m v! S& ]6 t; E; E" l• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 0 d# ^8 ~8 N5 S* d9 Q5 I9 ]
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
3 `0 b' S2 b0 }, F7 O• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
& g8 \$ G6 B6 h. ? E• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ( x) u1 e# ?4 N: ]7 M
• Share best practice opportunities and provide an industry experience perspective; 8 i' S7 ?0 \. {# _6 p
• Support and participate in SOX 404 compliance and Audit review activities.
- n0 s6 m# U- Q$ t6 M" u+ K
8 j# K0 }& m* X4 x( ]& |: ~+ d7 B* f% t$ w- a) z, Y, t, b% ?
Education / Experience& @/ B* x. c: u) B. S
• University degree in the field of computer science or other appropriate discipline;
8 @. }% m( i$ s2 Y: [• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ! P/ M$ c6 w- v) d. |& G/ G
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; * v" C i+ G& M `
• Excellent verbal & written business and technical communication skills;
; W6 O: p# z5 M7 W* G) t0 o5 H' r• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
5 b5 l2 \5 r9 r0 g; }/ t5 q' F- j- H) N2 ~ L* |* u' @ [
The following experience would be considered a strong asset: & A* Z4 r. t/ C
• Multi-tier computing architectures and middleware technologies; # Q6 }3 _7 _- j$ f) S- `
• Web-based and 3rd party access authentication mechanisms;
( x+ ^6 o8 X9 E! _- @• Demonstrated technical and security solution leadership;
5 O+ {; d y$ E5 l* i- ^' B
. I1 Z% \8 ?# Q+ z! B( @7 r/ J" `Education Accreditation, Certificates and Licenses:
, J( }6 M/ X: _5 d ~ c) y0 J• Possess or be working towards a CISM, CISSP or CCSP certification. |
|