 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting & t6 ~0 a8 A! R* ~" J f: I7 d5 j5 A J
Job Title: IT - Security Architect 6 e! g0 t# L% U X
Posted Date: 10/22/2009
# y+ w& x, t, I0 F9 D0 X& DDepartment: IT-Admin 4 s3 O4 `. ]2 L: t0 M% L+ M
Closing Date: 11/05/2009
G% R/ I3 @: e, H' PLocation: Calgary
7 X2 ?( `) ^3 NFull/Part Time: Full-Time 2 k9 | A1 `' K+ s
Regular/Temporary: Regular
( v+ E8 i+ o9 I; r
4 W6 g5 p: w) A9 o YJob Duties / Responsibilities
& V' A( E( f; l. D• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ]: |. s9 R) Q) N
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
! l; \1 z- Q6 U• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
: L8 |: S; ~3 P• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
' e, p8 V" |* S1 s( E2 ^# X4 x• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; $ D# E# G, q# X
• Share best practice opportunities and provide an industry experience perspective; & _2 W4 s/ K2 k8 M
• Support and participate in SOX 404 compliance and Audit review activities.
; B2 `$ q+ {! i; j9 y. E; o$ s7 X0 r5 @+ ^7 D/ s" J: d* o, u& k& V/ Q5 I9 D9 L q
c$ x. c7 z! B& c1 U+ v
Education / Experience
( U' T$ y, O. v# q: q• University degree in the field of computer science or other appropriate discipline; 2 E( L, D3 a. r' E1 K9 L
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; $ }% l& S) r2 K& R$ L1 F9 I
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
& J1 s, W. ]4 I• Excellent verbal & written business and technical communication skills;
/ X1 Y1 N. T, Z, a• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
+ a+ G& i: B# a" k& ^- Q' y7 Z
/ [9 r8 s5 n- s F: R# X5 t. hThe following experience would be considered a strong asset: 6 i' u2 i4 t% y% R
• Multi-tier computing architectures and middleware technologies; 3 Z9 V% K6 `1 X2 w
• Web-based and 3rd party access authentication mechanisms; 4 _: C' G! U% `8 E, _ l7 E1 T4 j
• Demonstrated technical and security solution leadership;
9 N% b- ~% U, J1 [0 @; p' A6 A) r+ g& ^3 g6 D2 M* I
Education Accreditation, Certificates and Licenses: + I2 }: p/ ?. @' t4 A9 T1 b
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|