 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting # v! g- j! j" B( q D" X+ i, g
Job Title: IT - Security Architect D/ b O9 Y) N: D- U
Posted Date: 10/22/2009
0 L4 r3 ^- M/ m8 x4 F5 \Department: IT-Admin 0 f& O4 C7 Q& [' W
Closing Date: 11/05/2009 8 t6 S" y* M! v! ]6 N/ q8 Q6 J
Location: Calgary ( s, k* L" u2 P
Full/Part Time: Full-Time
$ B! z! O, j" I lRegular/Temporary: Regular , @3 v& a+ g" y1 F+ v8 } b
$ K2 O; d9 v% S: ~* t* e7 |" A b
Job Duties / Responsibilities
! s6 C! g" s$ y) @/ }• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; * O7 G6 `% d7 ~( U% D4 y( A; L
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
8 V# R( T+ W1 s6 [0 X: c K6 ], e, _• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; / X& n' i" |6 `: |% x4 |
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
) o) N! \3 ^/ G• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
$ F4 J3 m' J$ Q1 I) h3 P• Share best practice opportunities and provide an industry experience perspective;
& ]1 {5 N2 T8 d0 _; S• Support and participate in SOX 404 compliance and Audit review activities.
; O6 m, @. \0 p- f _' e# h- }# d ~) `4 ?, i0 X
0 p) |+ u7 K* _Education / Experience
0 r0 e# y0 P K, b9 y8 T, \• University degree in the field of computer science or other appropriate discipline;
g+ T0 u0 I( G7 a• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 0 h" F) [: ?; j l; j# k' N! M
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; / o) k: W+ k4 ~
• Excellent verbal & written business and technical communication skills;
7 n. E/ u8 Y4 G% A• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. " ]: X+ J9 D3 r a( \, v
' ]3 V8 R* H9 l" p, N7 j# F
The following experience would be considered a strong asset:
" C5 @# A$ b0 k" j1 H: u• Multi-tier computing architectures and middleware technologies; 4 b* E' Z4 _- R$ Q, K0 H3 F& [
• Web-based and 3rd party access authentication mechanisms;
6 p$ _' a2 F# `; B" Y3 D2 m, S• Demonstrated technical and security solution leadership;
2 n% |3 ?& C8 Q" a: V9 x: t1 O1 B; `! h% e8 P" j( S
Education Accreditation, Certificates and Licenses: ( V% a: d8 X6 X% p% T) B2 I
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|