 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 6 T4 w; h+ |, d* ]" F) ?' ~2 h
Job Title: IT - Security Architect ( P; E, N; y7 h
Posted Date: 10/22/2009 b1 j, }) K9 B W8 f' e1 O1 J
Department: IT-Admin 9 K2 f& i9 U9 Z2 p. b1 D3 k
Closing Date: 11/05/2009 ! x# ?5 Y) a- o, s6 M9 C: {
Location: Calgary
2 j, q3 @' i" e5 A( FFull/Part Time: Full-Time , O( \0 X; d& c
Regular/Temporary: Regular $ b& ^5 [ `$ r6 k+ C+ E7 g1 k
, p) H+ T1 K+ }2 [) t! A
Job Duties / Responsibilities" ]* i9 _6 C, W
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; + O R% P: K6 a5 K$ b7 |# t
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 7 Y' ^ s; f5 d. R1 m( t
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ M# {) g8 h5 c) J• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
) x% P4 G. o- F* ~ j7 ]• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; - {! d+ b4 Q7 C" W X
• Share best practice opportunities and provide an industry experience perspective; 9 ?% v, A0 ~& w
• Support and participate in SOX 404 compliance and Audit review activities.
/ N; I' ] F* e6 A, ^8 f: Q0 N) P5 ]1 ]# k" h% L7 t
7 e" M0 C' B {, M! y- LEducation / Experience. c7 P. N; D. ^% e( X
• University degree in the field of computer science or other appropriate discipline;
' l9 ?3 X& ` [• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; , [/ `0 E& _$ J2 S
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 4 e: K$ _) i" O5 y$ s
• Excellent verbal & written business and technical communication skills; 5 H b0 t* O; |+ ?2 i) C& y4 e# `5 y0 l4 G
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. v5 ^8 r7 L" w' i
* b6 ^5 ?% n# W0 `& sThe following experience would be considered a strong asset:
' i# i0 d) E! ?8 E8 f* ?; b) w& O• Multi-tier computing architectures and middleware technologies; 1 G: s5 v* L& A4 j9 ]; ^4 n
• Web-based and 3rd party access authentication mechanisms; 4 Z; n; l& G' L3 j6 A5 Q0 g" Z
• Demonstrated technical and security solution leadership; ( Q6 F" G( b2 E* E; k
9 V1 b" L1 U2 ^1 Z. S
Education Accreditation, Certificates and Licenses:
! U# u. C, i3 p- S• Possess or be working towards a CISM, CISSP or CCSP certification. |
|