 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting . m( i4 J) Z* p4 b: J7 V0 X
Job Title: IT - Security Architect & [. ]3 P& J& j5 W
Posted Date: 10/22/2009 , i) W) ~8 i& S5 q7 w+ j
Department: IT-Admin . A0 c/ ?! U) @# N' C2 a4 ~& u# K3 s
Closing Date: 11/05/2009
E- y2 ~' h3 b9 _$ pLocation: Calgary
- W: m7 T+ V. |Full/Part Time: Full-Time 0 l( p/ y4 t: l' D1 U& G6 H: y
Regular/Temporary: Regular , g, a3 I+ x) `7 S3 {/ l
3 Y' L& Z% m2 t% W: y/ e( `2 V( QJob Duties / Responsibilities
. P/ x% K. j% F; M3 U# Z• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; " r" b c6 l6 K! p' p/ F
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
* W0 N* M+ o) m& C• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; / {* s5 l5 A- I9 o* D
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 3 f8 h8 a3 `2 C6 u; F
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; + ?0 q6 ]# a& w0 f5 Q
• Share best practice opportunities and provide an industry experience perspective; 6 J3 [0 z4 w: v9 ^1 z) J
• Support and participate in SOX 404 compliance and Audit review activities.
1 S8 X0 R4 i! j1 \ T% I, q2 s( D8 L5 v! n0 p# _% A' M
( z7 a9 j2 A! o
Education / Experience
' j8 i6 d( P1 J2 H! u• University degree in the field of computer science or other appropriate discipline; 6 u4 W4 t: t+ H& p
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 4 p) P% g1 G6 e Z5 p8 E. y0 q
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ; c6 J# A: b) z: P* b2 }' n
• Excellent verbal & written business and technical communication skills;
4 ~8 x$ B- f1 x2 H• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 6 i' `" _! ]7 Z' F$ X! d3 M; I
2 I! b6 Z8 B9 [! k0 y gThe following experience would be considered a strong asset: 2 z0 o7 m( J+ F) \ C
• Multi-tier computing architectures and middleware technologies;
2 G, d- ^( p4 {1 P# }$ t/ k6 b( ]# }• Web-based and 3rd party access authentication mechanisms; _; n5 W9 v# I
• Demonstrated technical and security solution leadership;
0 `1 n! }, O- S/ z: X3 N- j
) l, r8 z9 p1 n0 HEducation Accreditation, Certificates and Licenses: 5 K) ?2 M% U# H H: P5 t; d6 Z
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|