 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ h6 t' \- ^2 H% T" B
Job Title: IT - Security Architect 6 b% C9 Z9 ^5 q+ j0 u
Posted Date: 10/22/2009 5 y9 m9 i% \: _: y/ Z- L2 o
Department: IT-Admin # t) F" C! U- \# d# X0 q0 A
Closing Date: 11/05/2009 . G6 [1 k# W" {9 a D6 B7 z8 x
Location: Calgary
9 R0 B7 o, V% g& v2 [Full/Part Time: Full-Time
5 \" ?" c% S4 s5 ]4 ~4 V o* I; r5 rRegular/Temporary: Regular 5 n3 a' ^) t: S8 L6 B
5 ?2 j$ A/ [9 _6 p+ }Job Duties / Responsibilities5 g, V v2 v1 l' y# h2 `- q. `! E1 s: ]
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 9 {# p7 P4 [, }
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 0 K- u& l u0 R9 a( z
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; : C; m7 }6 P9 W2 l# P0 v
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
0 {- f3 ]& Q M9 o& q" P( I4 Y• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
" R( i- E6 E4 v' Y• Share best practice opportunities and provide an industry experience perspective; 2 s1 K1 R4 n" E9 X2 s0 ?
• Support and participate in SOX 404 compliance and Audit review activities.
4 Y5 i0 ?! ~, K; q1 D% Z2 N9 I3 @, C" A; t V
6 ^% {$ }: k* z8 o9 K; w: G4 O7 XEducation / Experience6 \' e, O3 S$ d- c" S) O
• University degree in the field of computer science or other appropriate discipline; 4 [% F; i7 x& ~! V4 s+ |
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
- a0 |6 t1 `: d7 d• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
6 T1 k2 }# q) h4 |) b0 w• Excellent verbal & written business and technical communication skills;
5 V' R" V# S& Q5 z• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, U0 a- h, Y! ?2 n4 y
& a- L; A# h* e- }The following experience would be considered a strong asset: : x: R! X- Y5 l3 |/ c
• Multi-tier computing architectures and middleware technologies; ! n, R q7 G+ M3 z! E# u- Z0 r
• Web-based and 3rd party access authentication mechanisms; ! W9 H5 P/ o. N- E j: Z6 Y# e X
• Demonstrated technical and security solution leadership;
' t9 u. I( S9 r4 f0 f, x
( h Q4 X, \" q7 E3 S# YEducation Accreditation, Certificates and Licenses:
0 e0 A& X" c1 u( c- r; `+ J& ?; b2 ]4 }• Possess or be working towards a CISM, CISSP or CCSP certification. |
|