 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 1 s- J3 _# e4 G6 J$ V6 n
Job Title: IT - Security Architect
& f7 s, i( ?. v7 i8 GPosted Date: 10/22/2009
2 K+ p: ^, W) b% [ XDepartment: IT-Admin
! h# {- E& _9 |5 tClosing Date: 11/05/2009
3 M. |) G+ g: h" C3 }Location: Calgary 7 Z$ Z4 ~5 ^; B; H N! k
Full/Part Time: Full-Time 0 O: ?. M5 l2 _- p7 B8 q
Regular/Temporary: Regular
& ^6 O1 Z$ @! v4 }, ?- ?! ]2 b0 {) P$ S+ h
Job Duties / Responsibilities
/ p' s# s8 L/ v1 E0 D• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; , Y8 Z8 S1 e5 M8 b- S! ]6 J
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ! P& W. N/ ~9 G1 R7 E+ k
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
4 E. n6 h4 M- Z4 o4 ^! S• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; # W/ X' S- D' o0 `2 T
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 8 o* n1 H/ }, G
• Share best practice opportunities and provide an industry experience perspective; & B, n4 Y: f8 F/ O" M8 P5 A( K1 p
• Support and participate in SOX 404 compliance and Audit review activities.
2 s0 @# q7 _$ H: i
6 F6 ?+ B7 y. g1 F4 |/ X* J0 k
- V& Y0 l/ Q( _8 [/ [Education / Experience( d7 D1 |1 J/ H1 q4 o# ^& U, V+ ?
• University degree in the field of computer science or other appropriate discipline; : a( @" W$ x& U$ S/ D0 a
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
: S8 c s6 h! A; p• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 E- l* L+ n3 h/ L• Excellent verbal & written business and technical communication skills;
2 `8 x: P" [$ A- F' K3 `8 c6 a• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 3 C- E$ }; s9 c v9 |
; `$ t; p$ F0 W$ Z" N
The following experience would be considered a strong asset: / q2 J# u! e. z9 T' l' J# R
• Multi-tier computing architectures and middleware technologies;
/ }/ F1 I: z! t) ?. x8 A) F9 @• Web-based and 3rd party access authentication mechanisms;
! @3 M- ^! q# }# w3 Q, ]• Demonstrated technical and security solution leadership; 4 W! l8 T, m* D* w
$ k" o( K) G/ PEducation Accreditation, Certificates and Licenses:
: B- B) d. p% [2 Q$ m+ Y' I• Possess or be working towards a CISM, CISSP or CCSP certification. |
|