 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ( c6 j" i1 F1 m* V5 }% O; M! a
Job Title: IT - Security Architect
' F0 [1 Z$ M* f! c' A3 VPosted Date: 10/22/2009 ) R% r. Y9 ?2 C8 y. Q
Department: IT-Admin 3 F. N# ~ c: ]# D( h9 |4 t
Closing Date: 11/05/2009
7 N* P% n9 \: h* bLocation: Calgary
) u) k7 l+ A) Q4 p2 b) |2 c. cFull/Part Time: Full-Time
5 q2 [; [0 w7 Z$ b# L' y" ZRegular/Temporary: Regular / e4 o4 W- K5 M; M0 t% @# I6 s
% S$ c5 t1 B9 ?Job Duties / Responsibilities
6 k2 \" P* F( ~& N* R' {• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
/ |; X) w& @! w8 a3 |( u• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
# G8 c) m8 ?( y4 {. A% E; ^& h• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 6 D% W/ M3 n. p7 m1 i9 z; K" U% Z
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ' A1 C9 ~* O( O" }
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
* z, l4 P- p" ^, F/ _6 [• Share best practice opportunities and provide an industry experience perspective; Z7 N2 b$ R( ?% m$ \
• Support and participate in SOX 404 compliance and Audit review activities.2 t, u+ C5 Q" Z, u
+ N7 ]: u |! T- I
( I# ]. B4 K9 l( C OEducation / Experience/ ^& Z x/ y* M$ J1 O
• University degree in the field of computer science or other appropriate discipline; 6 w, z; T9 T) ]2 R7 L( M7 D
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
2 A2 n8 y+ k# T• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ' T$ e _, [ Z( m
• Excellent verbal & written business and technical communication skills; 0 r# E5 x1 K: `# @3 J! }
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
# Z5 {/ d7 V$ _" }- n: _( v- B7 b/ c6 Q' q; n9 a* Q9 A0 ^
The following experience would be considered a strong asset: ( v/ [$ j5 B8 L# `
• Multi-tier computing architectures and middleware technologies; 6 ` O* x" Q) }( |& O: v& u6 u/ Y
• Web-based and 3rd party access authentication mechanisms; 0 W* [ C7 E. O
• Demonstrated technical and security solution leadership;
5 W5 O+ n( Z# e/ h3 x( ~' W: I, D% l- q' t
Education Accreditation, Certificates and Licenses: 8 v2 X: {: g' y3 O
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|