 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting D2 F: }6 @' @* a/ @" Y
Job Title: IT - Security Architect
/ I1 t# y& b6 ], WPosted Date: 10/22/2009
. ^! a; V+ O* ?4 T5 lDepartment: IT-Admin ( q S' o) a7 y# T3 ~) W
Closing Date: 11/05/2009
0 x% d' H( `# X! ZLocation: Calgary 3 ^! b/ W5 h" g/ ~1 e& B4 o1 p; I
Full/Part Time: Full-Time
3 @: |. B+ }$ @6 u5 H1 W( s2 kRegular/Temporary: Regular 9 ~) [2 k) j9 M6 f/ F a' w
`- R' E' t- j- ]: L2 x
Job Duties / Responsibilities2 E4 w1 _& h5 x5 Q4 |- n9 i1 g
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 6 ^( A) a! r* P7 P- r
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
: {! B0 F$ ]% N, T9 d4 P8 @) @( J( p• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
5 r: P% @3 I- `" y$ Y) d0 f+ {• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
' d$ H( U5 V( l$ e' l6 [• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ' j B0 ?% u/ Y
• Share best practice opportunities and provide an industry experience perspective; $ _6 ?. B- b! P4 H: K, l. U
• Support and participate in SOX 404 compliance and Audit review activities./ j Z+ F# {; W6 p
" J m S- H) v5 Z2 D m, j" G& p0 O
0 Q3 Q U( j: n% _& u& u+ q8 f9 R3 R
Education / Experience
) W) S( x( E4 h• University degree in the field of computer science or other appropriate discipline; 4 ^4 k) r" }+ L; l4 n
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
$ g5 I4 ^ g' G% Z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
" R6 p% c& H2 g8 r0 A1 x• Excellent verbal & written business and technical communication skills;
! [0 f4 i @6 c- ~- m* r/ K• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. " v) ~3 H& \7 m4 _
2 Y2 }! c- V* X! |% k+ a2 q( K- t
The following experience would be considered a strong asset:
' x, Z9 ?) y' J• Multi-tier computing architectures and middleware technologies; 9 D' L! V4 g+ k
• Web-based and 3rd party access authentication mechanisms;
$ v$ S9 q8 o7 A/ Y/ ?5 q0 O- O2 s• Demonstrated technical and security solution leadership;
, R x9 y' L, U. n, ]$ Z+ P' y* Y0 ?: N3 f
Education Accreditation, Certificates and Licenses: & j6 \( K" q O( M$ V K
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|