 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting " U* m" F6 D7 d
Job Title: IT - Security Architect 3 Z8 B1 p6 v% ?+ c5 f( {
Posted Date: 10/22/2009
' C1 p% j- E u/ J" o, a6 D5 cDepartment: IT-Admin $ N$ h% U4 p# T9 ]9 M! O. Y" @
Closing Date: 11/05/2009 0 G, h( J; J. ` L6 M2 m4 A2 Y
Location: Calgary . ~! O: i# i2 \6 C" v3 p
Full/Part Time: Full-Time
" N; q i1 b. \Regular/Temporary: Regular # @0 e- ~; }4 D) k' O
; U0 n7 S) h( v# F* F
Job Duties / Responsibilities
; }1 `9 c- I6 s C+ a# J& p% i6 R• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
5 P8 |4 m& T7 J- O2 R4 n• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 3 O% X9 c/ ]: S& Z& x% h
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
' r+ E. j4 m, R9 n: V, [• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 i/ i7 v% X' x) [( K• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
" t2 ?3 ]0 Q0 r* j& q• Share best practice opportunities and provide an industry experience perspective; " j9 P, D+ a9 A! } _
• Support and participate in SOX 404 compliance and Audit review activities.5 r- K0 J; L9 ` Q) E) q
~+ u6 V7 c' k0 r9 q) o9 [
3 b" C& m( ], m e$ G
Education / Experience
5 O' y( L) ?$ Q5 v. ?4 f• University degree in the field of computer science or other appropriate discipline;
6 X& S) K: V9 a1 W9 w• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; Q& I* w9 _) ^5 Z3 ?8 B
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; # |0 @' F5 z: o. V' Y7 U& l3 U8 J
• Excellent verbal & written business and technical communication skills;
9 O H/ r8 i0 w) q( n+ X% J• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 4 l& Z8 Y9 X$ `' o
7 j1 f- I& B9 t3 c" L" o
The following experience would be considered a strong asset: % j6 o! i4 b2 E: t
• Multi-tier computing architectures and middleware technologies; 7 u' h) z" f% O$ j8 Z1 t
• Web-based and 3rd party access authentication mechanisms; 8 L- f2 T8 q: p4 o) \) Y
• Demonstrated technical and security solution leadership;
4 ?1 Q8 y3 r5 b8 ]- j* h) e. q) h3 ?: ?' b% Z( K$ ]4 q. ^% ^
Education Accreditation, Certificates and Licenses: 2 [& Z, U. B" |2 K
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|