 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ; b7 b' \* m6 E. y5 q3 M7 T
Job Title: IT - Security Architect 8 L- u* A! Y& q* {+ _1 A
Posted Date: 10/22/2009 9 ]+ F& l0 p( T
Department: IT-Admin
, D4 q1 F. D1 c$ z. \7 e( oClosing Date: 11/05/2009
. H- `3 U- A7 J/ FLocation: Calgary 4 |. a: \9 M$ o7 \; _' f
Full/Part Time: Full-Time
3 _; N/ }! _, U% B5 j+ A& L6 cRegular/Temporary: Regular
3 ?) E0 u, _* A+ O/ z) P1 l- H' `& @
Job Duties / Responsibilities6 u0 U( O% v4 S7 [, ^/ ?5 e
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
9 t7 t- O w% w% {+ A, g: @9 ?( a# X• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
/ R U5 O* m3 ^( X8 G* M- B. a# ^4 A• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
, w- R+ }' Y. `+ f2 J0 l4 v1 O+ [• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; / G* w# y" ~7 U* b% L8 |
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
& J' ~& L6 k7 q' y• Share best practice opportunities and provide an industry experience perspective;
; H3 v6 u' V& u• Support and participate in SOX 404 compliance and Audit review activities.
2 J( [9 \, t9 q! g
. a1 L, Z% _& I' a
7 \5 U3 k2 {* a& X0 jEducation / Experience# l7 ]0 m* n+ u" i5 G2 ?
• University degree in the field of computer science or other appropriate discipline; % e+ {1 @9 a7 w
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; & i9 E+ N/ F# b9 p! Y0 f+ I
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 3 n' G3 X2 h) ]3 ? q+ w* G
• Excellent verbal & written business and technical communication skills;
- {) o# Q1 d, c5 m0 I9 W2 D. a• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
2 [; |. M% \) S9 A1 X! t4 `! p$ ?/ E f" s
The following experience would be considered a strong asset:
1 J7 E9 e; P5 V+ H• Multi-tier computing architectures and middleware technologies; ( h! k8 k6 H6 f0 a2 b& E, G
• Web-based and 3rd party access authentication mechanisms; ' s' r: E: s. _
• Demonstrated technical and security solution leadership;
8 R. ^, S* d7 r' U4 q4 V' f7 _! `
: y# ^1 c- x9 s. j, ~8 @Education Accreditation, Certificates and Licenses:
5 ~1 v1 I7 ?1 y- `3 A7 B6 G" ^+ f• Possess or be working towards a CISM, CISSP or CCSP certification. |
|