 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 3 Z) q/ K. I" |3 k; g; u
Job Title: IT - Security Architect 4 B4 c- l( ?, }5 y( g2 ^
Posted Date: 10/22/2009 - o7 k- Z* X. N7 l- l9 u% a) d, {
Department: IT-Admin
; W4 d0 ~* |5 h0 _! qClosing Date: 11/05/2009 ) i/ \/ I* j/ {( m+ r2 W0 ^& l& _
Location: Calgary
& u- c# |+ W% X& t# |Full/Part Time: Full-Time
- H% Y a( U" ^+ URegular/Temporary: Regular
: v8 u& ]- S$ A: K. i# U( U4 x# n# S4 P: R9 a+ j0 @) z
Job Duties / Responsibilities9 j- q N, c' f- [2 `+ P4 B8 f
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 9 i: t' x* f, V& t) y t
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ( p8 o* A* x% I( s6 U; ^. ~
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 7 A0 X% s. @) u; q
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ) X3 x: j1 g0 `
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
: L0 @: W" ?' U. i• Share best practice opportunities and provide an industry experience perspective;
4 r# F9 X7 n4 X2 b• Support and participate in SOX 404 compliance and Audit review activities.: U" E) i% D% d( v+ n
7 G Q# H8 o1 O4 s6 n) i4 L3 L: l2 G. m W1 _# `
Education / Experience) @; N$ C$ {- o2 R0 G. {2 S s* Q0 p
• University degree in the field of computer science or other appropriate discipline; $ J, O5 z% ^- Q
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
+ l6 j( ?( l( @• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 w9 @% _! }% D! D
• Excellent verbal & written business and technical communication skills; : J. _# m4 ^0 l6 C$ ^/ K
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ! ?) O7 w- G3 N7 C3 K, B
) ?: f9 G3 {0 J8 B/ p- |7 IThe following experience would be considered a strong asset:
0 Q' F+ U4 F+ j" a• Multi-tier computing architectures and middleware technologies; # ?3 @+ r d4 w
• Web-based and 3rd party access authentication mechanisms;
6 Y$ e5 [$ e8 O+ i5 F8 X, t: F• Demonstrated technical and security solution leadership; " |# x$ T2 ^5 {4 o: V( k' T* f
; n) I8 c: u3 J) |Education Accreditation, Certificates and Licenses: : [+ X- |$ l# Y4 t5 F# V, N- i
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|