 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting : T" Z$ i8 Q# ^/ D! K" W3 g# A3 B
Job Title: IT - Security Architect 0 w! G; Y9 J9 Z9 _* R5 |
Posted Date: 10/22/2009 4 Q0 @7 y3 L6 c: g
Department: IT-Admin 4 [: N) S6 y% L: w! E \
Closing Date: 11/05/2009 & \7 C: E) T- z8 c
Location: Calgary 5 @3 D7 w& J4 Y! V+ s, r
Full/Part Time: Full-Time
& z* I" L* h3 x- M$ `7 KRegular/Temporary: Regular
7 F4 S% Y3 D6 R1 [* V! i7 G/ \1 ^* c; s0 Q$ p. k3 r- A1 p. k6 s# A
Job Duties / Responsibilities
/ B" k- E* d3 y5 o* e. h• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; * i6 u+ M" o, I- \( D. K" n
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
: n, j1 E2 I# D; u1 s8 w• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
' Q: |% Z- R( g3 p0 |& Z$ U• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; + ?% e( _2 K, @# p7 D S7 a
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 8 O7 z- g$ ~$ [' D$ H: _
• Share best practice opportunities and provide an industry experience perspective; 0 m, n5 P) _$ j
• Support and participate in SOX 404 compliance and Audit review activities.+ q! l, t3 Y) w1 e3 g$ U! N% [8 X
. R2 T H+ }2 }4 u) _& }% \5 t
U& i0 E# D7 G4 b6 s6 KEducation / Experience [& @# O/ R: B( ]7 D) T9 C9 G3 F
• University degree in the field of computer science or other appropriate discipline;
) u7 A. X9 U4 m, T6 p- @0 |# Y# M• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
1 j1 \& U, e! z1 K2 A; i% y• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; # F2 n; E) f( r: {4 p8 d7 C q
• Excellent verbal & written business and technical communication skills; 7 K: ~% z. k) C' z- l$ b# Z$ ~7 Z
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. , b4 E0 Q. n. `/ Y
0 O6 h' p1 [3 k! m3 f
The following experience would be considered a strong asset: * A+ a6 M3 I* f5 l& w: i/ M; Q- B
• Multi-tier computing architectures and middleware technologies; * N# N8 M6 j- V
• Web-based and 3rd party access authentication mechanisms; . U. b+ j1 ~* O, _% _8 R
• Demonstrated technical and security solution leadership;
: q% _# }2 E5 } g, p& D& U) y
2 ^5 r3 f7 ~" O& `Education Accreditation, Certificates and Licenses:
" W0 S1 K2 i0 n' V s: @! |• Possess or be working towards a CISM, CISSP or CCSP certification. |
|