 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting % i3 H* N2 @! g; L# t5 B/ r
Job Title: IT - Security Architect % A5 L! t7 H: O9 t" V" V
Posted Date: 10/22/2009 % \' l8 I0 r, ~3 B
Department: IT-Admin
# x) e% m( B6 P3 S" G. BClosing Date: 11/05/2009
% I3 O5 t- N' |: x: w2 kLocation: Calgary
6 Q8 T7 o; v& PFull/Part Time: Full-Time ( C2 K9 m7 S5 c- z! R1 v _7 N
Regular/Temporary: Regular * Q. `+ G: Z/ e8 E, }1 ]0 T0 e
) T% L% _, d% S5 K5 L S
Job Duties / Responsibilities
/ u8 {; `. Z/ l' O* C, I$ _6 P• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
9 P: N+ v3 H* M1 b B5 }& U/ y• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
3 @- h! E1 U0 l; r. \' n( @• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ; y, U' _9 K+ \" s
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 5 O% d) `) a4 \9 e7 X
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 4 l: c- ]4 w* f' j
• Share best practice opportunities and provide an industry experience perspective; 2 ]. p' \/ J! u( p& t7 R( U! m( t
• Support and participate in SOX 404 compliance and Audit review activities.9 o5 w# n6 K7 E
9 o4 I+ x, d: y5 ]
$ T# c- [# m9 f9 ?- D J. y2 k
Education / Experience, F9 [( y8 G6 r4 z [
• University degree in the field of computer science or other appropriate discipline;
/ J, O( {% E# }; J4 w/ Y• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
9 t; n3 V Y% w, Z0 F; }• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ! n0 k# T- f* ?( I( W; ^4 Z1 U) X
• Excellent verbal & written business and technical communication skills;
4 s! ~' X, q* s9 N) n4 H• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. # |+ M7 O5 P1 L% H3 Z
% u7 l# S% }. g* c6 \The following experience would be considered a strong asset: 3 k1 W( r4 ~( v
• Multi-tier computing architectures and middleware technologies; , {) W6 E% b( a% G9 U. R
• Web-based and 3rd party access authentication mechanisms;
' F: b# p" T- z. c$ _% \1 K• Demonstrated technical and security solution leadership;
) K. v& f9 n; Q6 E3 P& A9 s1 D9 J5 n% e# |% w( `- R; c
Education Accreditation, Certificates and Licenses:
" ?! Q! m' X9 K6 A" e• Possess or be working towards a CISM, CISSP or CCSP certification. |
|