 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 7 X0 e. a/ y: k9 V
Job Title: IT - Security Architect ; v, I# c. x* H* @0 @
Posted Date: 10/22/2009
# O# }" y" y7 V" M7 f tDepartment: IT-Admin
3 n }& G V. E. L8 C0 HClosing Date: 11/05/2009 4 m) d2 w/ Y! _0 o
Location: Calgary
4 r' i$ m% x6 H% SFull/Part Time: Full-Time + d5 I: Q- U0 [% j, z% I
Regular/Temporary: Regular ; k( ]5 h* G2 ` q- i
4 M5 o1 N% Q9 O+ E$ u7 M4 \- Y$ rJob Duties / Responsibilities2 R" m' i7 F/ f" l9 ?8 f, }9 q
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; % I$ x$ t6 q) w" X7 }6 f# O. b
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
3 X3 P. H, |! ?# G1 l- [• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ `4 c7 ]/ c3 c" A F• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 0 r5 @) @$ G) }$ _ {& T* r
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
, Y7 k) e+ P, p3 L: d. U k• Share best practice opportunities and provide an industry experience perspective;
: S, r6 T: ~, C" X! x. \• Support and participate in SOX 404 compliance and Audit review activities.5 O! z+ ]) E0 T+ W+ ^( q" d
/ j7 z/ R* ~# w) m2 f6 i! ` m/ _& d& ?! ]4 o) u9 V' ?
Education / Experience" X( U% C8 M6 Y
• University degree in the field of computer science or other appropriate discipline;
9 D5 D; ]" |# c: x) a• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 5 d2 e* |( F) z2 E
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
; S5 E% l$ y/ }% k1 \• Excellent verbal & written business and technical communication skills; ' k9 J8 x0 r- x$ e( O- H% D
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 7 U/ a4 O% O% o- X& N0 I6 T
* V9 E" ?0 u6 d V/ n% f7 ^
The following experience would be considered a strong asset:
7 a4 ~+ x" j3 g+ o4 ^• Multi-tier computing architectures and middleware technologies; / d9 c% [$ c- h4 Z+ f5 `* ]" l
• Web-based and 3rd party access authentication mechanisms; + e F z \4 H' D
• Demonstrated technical and security solution leadership;
9 b/ p! L$ N+ W" p" C+ ?5 o6 L$ s8 r6 ? C( G
Education Accreditation, Certificates and Licenses:
) B. y: Z7 W! u. K; L+ q1 Z5 r# J• Possess or be working towards a CISM, CISSP or CCSP certification. |
|