 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ; r" a: y* l$ H" y
Job Title: IT - Security Architect ' K) V& A+ {9 |, L
Posted Date: 10/22/2009 # \6 Z7 d! x ~) S
Department: IT-Admin % {& B6 z/ s/ Q
Closing Date: 11/05/2009 / I6 d6 X' w0 ]- j4 r, B
Location: Calgary
* ]& Y- J! ]" x+ Z( `$ n6 s" |Full/Part Time: Full-Time 3 [9 D8 S% D% y: y
Regular/Temporary: Regular
; ?+ @' b* _' B. d
7 q$ L N7 A+ J$ V6 DJob Duties / Responsibilities6 O3 |% y2 N) O7 u+ T [" f
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
! y' @% R- f. j/ I ~3 E- q- I• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
?% Y. y' J1 \# `6 x: g• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 3 _4 y! }) U* l% Y M
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : S* t# N. {( w7 c. {0 a( L9 u
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
$ g- r/ r2 r: m• Share best practice opportunities and provide an industry experience perspective;
# O. Y. M/ n1 w; c" i• Support and participate in SOX 404 compliance and Audit review activities.
4 @& I) ?/ d+ o) l( J1 p0 _& S) t
/ k d* T# C3 @6 W* Q' |% x* O0 y( o3 h$ J
Education / Experience
: @7 u" j* H8 k( k: Q8 T% Q2 C• University degree in the field of computer science or other appropriate discipline;
, Y8 R6 u! C( ^# m: c• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; + { J4 g y' T) o; f* h. ?
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 4 {( i# m) A3 H& l8 N: O
• Excellent verbal & written business and technical communication skills; 0 J+ Q' S |( U( o
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
1 N1 v7 q: ]8 Q) z0 G/ t8 Y# {6 K! ?& \
The following experience would be considered a strong asset: " [* T9 e( }9 e9 h% D
• Multi-tier computing architectures and middleware technologies;
6 t0 j) Y& D3 P4 L• Web-based and 3rd party access authentication mechanisms;
i7 q" U9 t) U ^5 K" T• Demonstrated technical and security solution leadership;
; ^# P- u7 {7 }! U2 M S0 J9 b) F7 M3 z# c
Education Accreditation, Certificates and Licenses:
$ Z7 T8 J6 C! e4 m& [• Possess or be working towards a CISM, CISSP or CCSP certification. |
|