 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ F$ ~ v& Y1 p9 q8 n
Job Title: IT - Security Architect
' Y* Z8 o' H8 J# d! _$ oPosted Date: 10/22/2009
. Q! |4 q# F! w1 `/ M$ h! hDepartment: IT-Admin
4 `8 N! w0 n. _; R1 FClosing Date: 11/05/2009
" I8 i+ S' X) t1 e. n SLocation: Calgary . _( P5 W6 ]0 v; p C( h. ]1 w
Full/Part Time: Full-Time
. S( p0 l. D \- JRegular/Temporary: Regular
' j7 l7 j" d, |! w+ x+ I6 N6 ]$ ^% p% v* k. z- ^
Job Duties / Responsibilities/ N, K1 p3 Z$ b
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
5 F; W2 @3 Q9 A3 r1 p( l• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
5 A7 d' N( C2 ~) b9 g• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
, g" ?& A: L% x* \# c8 R' G• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ; u5 \ a# M0 u% ~
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; . K7 a+ W4 Q. q0 j& F& s
• Share best practice opportunities and provide an industry experience perspective; - c9 }2 H9 Q6 c8 Y) }
• Support and participate in SOX 404 compliance and Audit review activities.
9 a( d# f+ J( C$ v, M9 g3 |0 S
3 U2 @" ?' M: A u* |% M5 L& P# n7 t- I, A2 d( _+ a1 N
Education / Experience; G6 s( w" V( G& D
• University degree in the field of computer science or other appropriate discipline; ( d' @" j8 q; s8 E, _7 H
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
+ L- z; y0 S9 W: f1 R4 x. ]• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; : w$ _, ^; ~% P( t
• Excellent verbal & written business and technical communication skills; [; O f6 s+ |1 k
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
1 h5 m! X6 g% c
0 ^) q# s3 k2 z4 d! lThe following experience would be considered a strong asset: 0 b! q. H% J1 L: |3 y8 H# L. W
• Multi-tier computing architectures and middleware technologies; + E/ D8 D$ G) G& l; S5 Q! g
• Web-based and 3rd party access authentication mechanisms; " Q; _( k- V7 B* a6 v& R' z$ N, R
• Demonstrated technical and security solution leadership;
2 L2 R) R) u. l* b8 I# ?
3 j3 J1 s; u/ J1 `) Y4 [- {Education Accreditation, Certificates and Licenses: 5 |5 l% N1 S3 L4 E8 H) {
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|