 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
+ m, R/ i- H( I5 UJob Title: IT - Security Architect . ^0 A, M% G/ S, M; Z9 b3 d9 |
Posted Date: 10/22/2009 # u( h8 U4 v5 E0 y8 g
Department: IT-Admin
" ~' d& p- l$ @* f7 [Closing Date: 11/05/2009 5 h# y6 |' z& e3 J3 [( z
Location: Calgary
# R/ l) z, Z# Q; n1 ~; t" d; E) [& YFull/Part Time: Full-Time 5 X* h0 p! s: a: b }3 S
Regular/Temporary: Regular 5 ~& T0 M1 }, O! h
3 ^7 q8 ~+ B( K: `6 T, ~0 bJob Duties / Responsibilities
# b. D p' ?" ^• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ! z7 c# x2 s" I F
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 7 k' `6 f. i, N+ t: w
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
8 ~) i; v& |% H" s9 m2 q4 X5 }: Q• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
4 k" x7 W! T/ y: R4 K9 S• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
2 W- s7 E: Z# b' Y! j; u• Share best practice opportunities and provide an industry experience perspective; $ \* f) T, K% W: I
• Support and participate in SOX 404 compliance and Audit review activities.
" Q% |, Z7 W4 ^1 v% A, L2 ^7 b+ Z$ k2 F- X; l
! N5 u3 B: _. m3 m5 JEducation / Experience
' ~' m& y9 D5 O, ?4 u• University degree in the field of computer science or other appropriate discipline; 1 s0 T: H2 D2 [# F" _
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; & Q0 _4 R8 {9 C8 o6 V& O# }+ _0 o
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 9 ?2 e# y( p% k8 a0 H
• Excellent verbal & written business and technical communication skills;
. a7 H/ |- _" F9 X3 o) P+ N9 g3 t• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, ^8 \9 F" d% J" _- v2 x
" R: ^7 V: K& X" I% l \The following experience would be considered a strong asset: , z0 p W, c. \0 d5 X$ ?7 y
• Multi-tier computing architectures and middleware technologies; 9 t$ \0 x+ [. ]& d( C
• Web-based and 3rd party access authentication mechanisms;
7 t) V$ y( k1 ^+ w• Demonstrated technical and security solution leadership;
9 g" h# s" I4 j, E
5 f" O7 a' [* C. V5 fEducation Accreditation, Certificates and Licenses: , S6 h2 m0 R2 S4 s& ?/ |. ]
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|