 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
3 \7 ^! R* q: a3 C: u0 Q5 bJob Title: IT - Security Architect ( h' B# E/ F' t( ^5 G
Posted Date: 10/22/2009 . n' e! ~+ n% v9 O- Y5 Z) }+ O
Department: IT-Admin 9 r0 q3 z$ A+ v7 z: {" P
Closing Date: 11/05/2009
( b1 ] m+ i4 d0 I$ pLocation: Calgary ! f# Z% e/ x0 @& S: j. C
Full/Part Time: Full-Time " G- g8 g/ ?0 p( P# m5 q0 z
Regular/Temporary: Regular
1 I5 }! W; U" J0 W, l8 R' F* g2 x6 X7 K. l+ n/ y
Job Duties / Responsibilities7 i! a* w/ \! r* a. ]' ~
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; * v. l" D6 g* N- p k- Z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
' ]! Y, u, _. f0 _7 s5 J0 ~5 p• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
6 f) c; U" N3 J$ e4 |0 j• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; $ A7 |% E$ U3 s8 \8 u
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
. S( [6 x/ v: @2 z' ^) i; n• Share best practice opportunities and provide an industry experience perspective; % K9 k5 a& M- l- K! c0 s
• Support and participate in SOX 404 compliance and Audit review activities.' P( D1 ~9 A0 k! G2 u3 D
$ M' E7 r4 i- a5 K
5 p# [+ K# w f3 d3 aEducation / Experience
1 h7 Z- r# f( Z0 w& ` P4 w• University degree in the field of computer science or other appropriate discipline;
* R) M' G, E, }3 F5 x) C• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 8 Z5 @( S3 I& }1 y- z
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 2 ^0 S- B* t* M3 b0 |
• Excellent verbal & written business and technical communication skills;
+ ?5 W$ D5 s6 ]( v; Q• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ) v: [7 Y$ B; T4 h1 H E
3 ~; l& ]* o+ }# ?5 V8 k. j0 o1 V
The following experience would be considered a strong asset:
/ \: G% ?. g7 r5 g" G: N• Multi-tier computing architectures and middleware technologies;
( x, [8 ?7 Q3 n1 t* @* u9 v• Web-based and 3rd party access authentication mechanisms; / E- a$ U% ^9 T: `
• Demonstrated technical and security solution leadership;
% c3 o6 I/ J9 |
# }! Q6 u# H O/ WEducation Accreditation, Certificates and Licenses: g) i3 |1 J6 y+ z0 J4 H) |1 }
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|