 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
! w; H% n( l; @# q* }5 u9 ^Job Title: IT - Security Architect 0 O l! w" ^" H1 v: \) e
Posted Date: 10/22/2009 3 f+ s6 H1 K- K! ]
Department: IT-Admin ) V8 M% {2 G$ \9 F3 C1 O
Closing Date: 11/05/2009
: r+ U7 l. B5 Y- `7 j/ v4 eLocation: Calgary
+ [& d: w7 W$ \# U( pFull/Part Time: Full-Time . z$ M5 q6 c p. C, O* w8 q
Regular/Temporary: Regular 8 V; }3 g6 H" [2 ]/ L( f7 G1 S/ S
# |- s. [/ e5 o0 h+ _ j6 |
Job Duties / Responsibilities
- f- T# _" n; i: O! t( o• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
" h% v6 h" I6 \• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
7 A, X1 j& t: d' L+ X• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
9 ?4 h) w! B4 V• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; % W. n9 F; P5 s
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
! S# m/ i# _+ g/ u% o/ I3 H• Share best practice opportunities and provide an industry experience perspective;
7 I; J' D9 }" |• Support and participate in SOX 404 compliance and Audit review activities.
4 L& T4 N6 h) `/ `$ h; d* }, F' l1 m6 _6 T9 P8 k- F- M# ^9 d
/ s/ a6 u/ L3 X- h5 X& r$ K. v! zEducation / Experience5 t5 \0 {* ^0 W0 L! }
• University degree in the field of computer science or other appropriate discipline;
! Q! E$ _1 o4 \& U3 F, H1 ?• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
* F' Q0 m, x$ D3 ^# v+ N$ k5 \• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; , e7 X4 T. a4 E [3 W5 F1 A: E/ |
• Excellent verbal & written business and technical communication skills;
4 `" ]. U U/ t6 H• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
% w/ D: k8 _) c, t* n; G* _3 \! m) W# w) z/ D* Q6 l( n* \
The following experience would be considered a strong asset: ) K/ K( p* k3 }+ A$ t
• Multi-tier computing architectures and middleware technologies;
$ Q2 r6 o- \- M• Web-based and 3rd party access authentication mechanisms; ) l) Q2 C% g% ~9 w' B
• Demonstrated technical and security solution leadership;
! B+ t% j ]: F2 b' h* }: w: j# w3 M. A+ R
Education Accreditation, Certificates and Licenses:
2 }% F o1 f X- T. w• Possess or be working towards a CISM, CISSP or CCSP certification. |
|