 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
5 d4 A6 E3 ?. X6 ^Job Title: IT - Security Architect
. I N% ]. O4 M# X1 pPosted Date: 10/22/2009 7 N0 _+ j5 u- l
Department: IT-Admin 4 |( X2 M# [; J5 x! f2 Q
Closing Date: 11/05/2009 " `6 w6 e# `$ N0 L8 M
Location: Calgary
$ i8 Z3 }+ {: U2 YFull/Part Time: Full-Time ! _8 L# V2 Q( ^0 K+ n5 W; ]
Regular/Temporary: Regular
H/ l# J, e; [. N" N5 t: _2 }: ~
Job Duties / Responsibilities
& `% X F; Q7 q$ D. m1 E! @) q• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
$ K9 }8 w% \$ w+ A( B2 _• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
8 r* y U5 j4 Q; W• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ G+ o& y/ ]+ e0 K# K" a• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 3 @( i* \5 Y) ~/ Z* b1 ~
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; , x8 r$ q$ E% w" `: ? o
• Share best practice opportunities and provide an industry experience perspective; - Z8 w! r1 _' W( F3 _& Q s
• Support and participate in SOX 404 compliance and Audit review activities.
5 q: X- _6 E% x0 `# p3 T! Z4 W( u2 i
8 j4 t( {/ R+ U$ O" d" q& VEducation / Experience
) O' ~. ]1 G- L9 ~" `• University degree in the field of computer science or other appropriate discipline; " i) M7 Y; S3 I+ Z; s# _
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 0 Z* I6 r' f0 \# [
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 3 F2 O- a7 }; K' @' G% z2 w# k
• Excellent verbal & written business and technical communication skills;
" [# I: c+ W* m# ]8 x0 O• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 5 `" d! @4 }2 q
3 Y# L* w% l8 K7 ~& x$ y6 ^6 vThe following experience would be considered a strong asset: ) s+ c& M3 y: L/ C4 h& R# D
• Multi-tier computing architectures and middleware technologies;
" k& f! U1 `1 ?; S! p0 O• Web-based and 3rd party access authentication mechanisms;
3 V6 a) X$ ^: U$ v: L• Demonstrated technical and security solution leadership; 4 ]. e2 h- @# Y
" ^& [! H2 F7 j/ t5 Q: {* O0 K
Education Accreditation, Certificates and Licenses: 6 u0 k, b$ w3 B- j
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|