 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting . M+ t- E' C) |9 T3 G- b; [
Job Title: IT - Security Architect
$ H2 d! I& x7 W7 a7 fPosted Date: 10/22/2009 2 ?2 ] T" y h4 O: J) u
Department: IT-Admin
6 |) N+ z5 v7 ?) _1 e! x4 dClosing Date: 11/05/2009
; m6 s: c8 [8 v, P" i2 S7 tLocation: Calgary 5 x' i& N- D# H; S' K. W. R# \' G
Full/Part Time: Full-Time ; j" n* L1 ]+ H7 H
Regular/Temporary: Regular
0 X2 M3 w5 [6 {# Q& T
" [- H+ k4 T/ j! _' Q' o. {9 oJob Duties / Responsibilities8 F6 T c+ J8 V5 S2 y) X
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 9 f: w W5 K- j
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; % ]" C5 i' A) N! E5 [- o" u
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 6 x; q5 @3 {8 Z( N: K
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
F" d! ^* g- l6 K) N0 D0 s• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ! E/ g$ W- o% l& N7 {& i: H
• Share best practice opportunities and provide an industry experience perspective; , x7 i) C9 ^" ]( q
• Support and participate in SOX 404 compliance and Audit review activities.* _4 F8 S& ]# ~- r! |4 K
+ x. Z1 K# m% X2 ?
+ F! N/ R! r( B5 [Education / Experience
# |$ r3 B; U9 D" d9 @. q• University degree in the field of computer science or other appropriate discipline;
2 R5 f2 k. {+ L3 x- w, S9 V5 |; A# g$ y• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 1 H- M, d" a% J, e* _
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 2 E/ p- J7 O! n9 w: m6 i
• Excellent verbal & written business and technical communication skills;
/ t# q" }. o+ u& K' }1 j• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
& p; o" Y4 k3 v3 m! k" |9 [% R6 W) |" E$ {
The following experience would be considered a strong asset:
3 P9 b1 D- Z; X }6 Q+ b• Multi-tier computing architectures and middleware technologies;
: T: p. P' S& `7 v$ i8 @8 ^• Web-based and 3rd party access authentication mechanisms; 0 ~7 r! D& [# `" z7 ~
• Demonstrated technical and security solution leadership; . p4 R! ~3 X$ @- G Y1 V _
/ S! N2 D: O0 M
Education Accreditation, Certificates and Licenses:
7 u) p$ J6 P: \ D5 H" p- M. u• Possess or be working towards a CISM, CISSP or CCSP certification. |
|