 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ t% I% E/ ]9 S6 {! f" i2 H7 f( }
Job Title: IT - Security Architect 7 G2 |6 |8 O; w9 `1 f0 _3 W
Posted Date: 10/22/2009 ) b. S# ? M* D' w) J# u
Department: IT-Admin Y. @. O" Q* c! }/ m7 a3 B
Closing Date: 11/05/2009
5 X3 [9 r1 u4 y$ l& n8 u" T8 ~: @Location: Calgary
0 {! D N/ F+ T6 r W- D& iFull/Part Time: Full-Time
3 J* U1 }3 |8 h4 u; P. Y4 v2 `Regular/Temporary: Regular
$ ~+ ~: W! V# M
$ ^- t% g6 y0 ^. g7 oJob Duties / Responsibilities. B% }: g- m! ~: y9 u+ ?2 q
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
; Z4 g; `2 G5 r1 O: a9 E2 e2 [. v& y• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
9 b5 u- L: }+ X' H1 Q• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ! B; v: G+ w4 H @# v
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 H6 P; k9 S7 j- F• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; & \2 \! F9 s6 ]& c3 X2 R' M
• Share best practice opportunities and provide an industry experience perspective;
7 {& L) A% k1 c3 y& t) T• Support and participate in SOX 404 compliance and Audit review activities.
5 M$ e. D* }/ n9 b
! ]: L5 n) E% |; J9 D, j( P" `; O6 F, ^1 c1 D$ V) S
Education / Experience
6 _2 ~2 t; k# o4 V• University degree in the field of computer science or other appropriate discipline;
7 n, @" z+ @. i8 c2 V8 S• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 8 X. K/ f, ?% r# |
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
5 u) N9 ^$ p5 H& H• Excellent verbal & written business and technical communication skills; $ @% B/ { G( p7 ~( d5 I0 ^6 |
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. $ {# w5 e0 t8 ]3 g
- k+ N1 T, |$ t% D
The following experience would be considered a strong asset: 9 M8 u, ~) q8 x4 I2 q# n
• Multi-tier computing architectures and middleware technologies;
% [8 R, l/ N3 s( g6 w• Web-based and 3rd party access authentication mechanisms; & N7 _4 J/ {( D, z/ v# P
• Demonstrated technical and security solution leadership;
5 q& J5 E L: N) U0 j) e0 ^8 c, ^2 E# h& r6 |! u
Education Accreditation, Certificates and Licenses:
& e5 g2 s7 [, y1 n8 N7 H• Possess or be working towards a CISM, CISSP or CCSP certification. |
|