 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting & i" i" f+ E8 i2 i
Job Title: IT - Security Architect 7 _% E7 c. o) `) M4 j- q0 r
Posted Date: 10/22/2009 6 D" z3 a- G$ X7 ^
Department: IT-Admin
1 [% B# ~8 ?; e, N: _% w! qClosing Date: 11/05/2009 6 V6 y$ d4 a: {& c
Location: Calgary
8 q: o1 r% T/ _/ _& m( n7 N$ VFull/Part Time: Full-Time
/ G# U" k+ r0 S$ \5 v( J1 hRegular/Temporary: Regular
/ x* s7 U1 M# O' P- w
5 z' V+ b2 S4 X) u4 pJob Duties / Responsibilities
, h+ P8 [8 }% b6 g6 ?4 B• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
) f. v2 I. U6 I) f• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
$ D- q# \, O g+ Y0 _• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
. T, J2 `2 J9 q9 L• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
$ {& W* R- D8 [: R' x' \% P" \7 E• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; & e b; v% A3 f$ F3 P d
• Share best practice opportunities and provide an industry experience perspective; 8 b0 g* v8 b+ \" @. c3 W2 x, V
• Support and participate in SOX 404 compliance and Audit review activities.
! T, i; T1 B% Q4 \% | i3 v
; N0 A& D1 V F8 @" F# z- U3 L( d3 W" O; B) k9 d3 p
Education / Experience \ U4 F0 g4 v) M/ ~
• University degree in the field of computer science or other appropriate discipline;
, J. \+ d: O% w6 B3 Y# s• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; / f' D6 x6 F4 z( l3 d \/ g2 s
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 5 p$ t' L/ m! D5 D0 C5 W
• Excellent verbal & written business and technical communication skills; $ R% U; {: Z/ ~4 X% S9 y- E% D
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
) l9 j& Z- Z( p8 A5 Y8 r, H9 n: ?" i0 u
The following experience would be considered a strong asset:
% w" u# `/ Y1 O. L, L' r# B• Multi-tier computing architectures and middleware technologies; / n0 G& I$ ^3 o9 Q+ P0 W
• Web-based and 3rd party access authentication mechanisms; 3 \8 G2 f+ U {* K/ L/ h1 u% \
• Demonstrated technical and security solution leadership;
' i: a( s& @, T+ z) u/ v/ e/ |( L& l" G" ^; s
Education Accreditation, Certificates and Licenses:
3 G: A- N7 V: Q7 Y• Possess or be working towards a CISM, CISSP or CCSP certification. |
|