 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
6 Q6 o! G5 V5 @9 h1 h! qJob Title: IT - Security Architect ) O' l+ \9 Q& V# ?7 x/ J+ F$ f
Posted Date: 10/22/2009
2 {) k9 K! y, W% Z( q% MDepartment: IT-Admin - X# Z- {. n) i! n! m
Closing Date: 11/05/2009 ! [, `9 A. J: X& m" ]8 y6 j
Location: Calgary 8 t% ?3 x9 d6 T7 B
Full/Part Time: Full-Time - F5 y+ a$ e+ {1 _4 g3 z. {
Regular/Temporary: Regular
* ^& \4 A. }/ p& e: \, C1 B4 z( z5 w1 O Z+ T+ z) m/ H
Job Duties / Responsibilities
* n# f& k* L1 p* x4 l# Q* e• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
% m o# E+ u* R; R$ {1 [7 B: ]• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 8 D! `; I# t8 U3 i
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; * Y$ y0 S3 q1 X& P4 n7 q/ u
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ! D# D* l" V) J; m4 L, z
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; * B5 H2 t9 b0 T% q- Q% Q7 b
• Share best practice opportunities and provide an industry experience perspective; ! C3 P9 L0 G! t: S ?
• Support and participate in SOX 404 compliance and Audit review activities.# m! z n6 M/ H9 p# R/ |
9 S# U& f! W' ?' Z( C a
$ b: t! N* R) Y* m, N$ I& d+ j2 Y/ w: mEducation / Experience
( o" y ]" n. @9 H• University degree in the field of computer science or other appropriate discipline; ; K4 h1 j- n, m2 l' I1 x$ q8 ]
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
9 f" d4 X0 i9 a, ^7 z9 T _$ ^/ w! R• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
& ~4 m$ X; T! r$ P+ R7 J• Excellent verbal & written business and technical communication skills;
& E: Y$ U( n0 X! u• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. & X; G, Q' N; ]8 R! I
" @# |! |/ O1 Q: m7 G3 H7 lThe following experience would be considered a strong asset:
; `3 H# L5 q; r: O) j4 U7 U• Multi-tier computing architectures and middleware technologies; 2 m9 L5 v0 r6 }
• Web-based and 3rd party access authentication mechanisms; 3 f. H* @" B+ d" p8 a
• Demonstrated technical and security solution leadership;
5 g. U4 D$ F6 W8 t) Z3 h
+ z# j$ x' ^% J5 h, x) |& C- S/ AEducation Accreditation, Certificates and Licenses:
- C' ?$ q g$ f) Z; B2 o' }/ D0 `• Possess or be working towards a CISM, CISSP or CCSP certification. |
|