 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 8 J3 C) I/ Z& c/ b4 M
Job Title: IT - Security Architect 4 n0 G" J1 A# u; ^7 \/ L
Posted Date: 10/22/2009 2 z- Q+ _) Y6 z6 N Y0 l
Department: IT-Admin 5 D( x" s: w* _* M. v
Closing Date: 11/05/2009 7 ?1 y, x7 n" S
Location: Calgary 1 s- `. F0 g, u% Y# B1 G
Full/Part Time: Full-Time & Y4 h# B, D" m) w; ?/ w
Regular/Temporary: Regular
6 z& \: n. k8 F) H$ k
5 l6 i- U4 ^3 T9 c1 c: ^8 V8 J) tJob Duties / Responsibilities7 A- \/ h. Z/ z F1 C6 Q
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ; _5 u, {+ U+ R* ~+ p: F; B
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
$ } p. I* P2 ~5 U9 ^6 a+ j; H• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
- N6 c7 Y/ V2 _0 Y& N8 ^9 K% O8 \• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
7 ]1 |; w: V, i• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
& {& f' X* c, l) x; E6 q• Share best practice opportunities and provide an industry experience perspective; , k- [7 d, H, R) d: h5 G \
• Support and participate in SOX 404 compliance and Audit review activities.3 K: g2 D+ v3 H- n7 `3 w5 v
. B" [9 j$ F4 X, [7 R" L3 q8 d+ a' ], o, Q0 f. j9 h' A
Education / Experience
0 q% S/ V4 d+ ^8 b/ I$ X* L& ~• University degree in the field of computer science or other appropriate discipline; 4 e5 t& x) C+ e: o! a" H
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
' o g" d- N0 D# G• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
3 e& ?+ w1 P8 ]) G( n• Excellent verbal & written business and technical communication skills;
6 [4 Q, n, H- j' W/ ^• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 1 s7 Z5 G0 }3 T. G9 h4 r7 [' m
1 z r, c& k7 n: D2 KThe following experience would be considered a strong asset:
- l$ @ i: s* S" c• Multi-tier computing architectures and middleware technologies;
1 J2 _' C0 Z- g3 ?( @; W• Web-based and 3rd party access authentication mechanisms; + i+ N9 |5 B9 M$ k: H* r' o, o
• Demonstrated technical and security solution leadership; 5 J3 O) ~+ S* n8 R
1 }# `8 \. B+ M% |% K9 I2 k
Education Accreditation, Certificates and Licenses: : K1 z$ p0 p( [# G( s
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|