 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting E1 \$ j4 [, B, `: |" v" {6 W
Job Title: IT - Security Architect
0 w' p9 P6 p* i E% p KPosted Date: 10/22/2009
6 H/ n% C9 _% e6 T' rDepartment: IT-Admin ! G9 _; G: S( S% n5 |* v' Z
Closing Date: 11/05/2009 " F3 n' L2 c0 n: v+ _2 M
Location: Calgary
( m; e }" }9 I) fFull/Part Time: Full-Time g, w+ I( O4 L* h! p4 B) i; I4 L X
Regular/Temporary: Regular
; w( I* N. u4 v/ \; q& T
/ `1 Q3 h* e9 |' R5 i5 {) ?Job Duties / Responsibilities( w% F1 d8 @. H
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
: J! M! ~+ t8 A. [8 y• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
8 D+ w0 j/ ~' L& }9 y; G• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
# f, F: y* O# S& l+ ?( `' Z! ]• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; . V, @+ s7 t5 @& i' c4 F. b
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; * F4 Z1 ]1 H4 x4 {; S0 X, m
• Share best practice opportunities and provide an industry experience perspective; 5 X: L. S6 q |2 k" T+ w
• Support and participate in SOX 404 compliance and Audit review activities.
( H" a6 T- Y( M! @0 w1 ]$ |6 ^0 Q9 n8 F2 M7 Y
" V% G) ?- v% v3 h* R1 wEducation / Experience, Q0 R2 s8 h7 n) Y4 D# i9 I' F
• University degree in the field of computer science or other appropriate discipline; . \/ |: E ]1 u9 ^
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
: h: C3 J. {: n) I• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 4 J/ Z) n [/ f3 u+ z& X
• Excellent verbal & written business and technical communication skills;
4 b9 p- u k) ~2 B! R! E, J8 P• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
3 g! V4 c2 [& N& r. s. }
: _/ c( j, y s' NThe following experience would be considered a strong asset: 6 Z* |$ M' a) O3 |& [1 I) k# o
• Multi-tier computing architectures and middleware technologies;
3 C3 v: s: d! k, F9 @7 S• Web-based and 3rd party access authentication mechanisms;
- Z' K, {2 @0 \! r5 D- x• Demonstrated technical and security solution leadership; 3 N8 C1 g) i' v3 n
2 ]% _4 ~; C$ q. e3 C
Education Accreditation, Certificates and Licenses: ' L' y! t! ^3 y$ v" Z) t& z2 Q
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|