 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
; h, }& F: z9 ~! J& VJob Title: IT - Security Architect $ [% B/ ^4 P9 Z
Posted Date: 10/22/2009 ' `4 Q: s. g% E s) t3 r5 n
Department: IT-Admin
D( D/ K/ i) o: {7 q& n: {Closing Date: 11/05/2009
) a5 Y2 a% K' @3 `1 N/ hLocation: Calgary ( T, Q f& P4 {1 u- I" E
Full/Part Time: Full-Time # R0 ^8 I+ u% D3 R0 }9 j+ o; L4 [! e
Regular/Temporary: Regular ) @8 Q! }2 c+ a- U" j5 `
+ U& V0 s/ U+ }
Job Duties / Responsibilities& N3 W) }3 _; F- j) q
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; / }0 [& U0 [' S3 E( i: K2 s- q
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
7 A4 T1 J$ d" k1 a• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
; Q1 ` Q$ S; N- e" E0 a8 G; E• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; / X4 W! |; O6 ~( Q! t
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
# H$ Y+ S8 \" l. y l• Share best practice opportunities and provide an industry experience perspective; 8 K) R4 o3 x, v7 }% T
• Support and participate in SOX 404 compliance and Audit review activities.3 |4 M# N2 Z* t4 m" z
3 h6 c8 t6 `* h+ P! m
! w/ w! e. b, Y- W; _
Education / Experience9 W% w A5 X( _- D9 _
• University degree in the field of computer science or other appropriate discipline;
. q$ T4 l6 p. Q& E• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
9 V0 G( _1 j8 _9 {/ e& x/ M• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 \+ X! |5 h! ^" q: f5 p• Excellent verbal & written business and technical communication skills; 9 }4 [4 O: ?) ]9 c0 j; ~
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
8 T0 F& p" _- O7 V) X. C4 M3 m( M5 W2 F) u" X& B9 q
The following experience would be considered a strong asset:
% u5 M$ ~; E. ?% ^, W5 E& q• Multi-tier computing architectures and middleware technologies; F& r6 t7 E" `+ [
• Web-based and 3rd party access authentication mechanisms;
0 ` [; d6 M3 t3 t) ]5 q& }% [• Demonstrated technical and security solution leadership; " `6 |! S! @; A( M" P
' N9 H$ y2 [3 y- d2 c. @Education Accreditation, Certificates and Licenses: 8 u7 h+ E6 _, T8 L2 t$ V
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|