 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
% {* L+ r H' `* a [Job Title: IT - Security Architect
' G8 ^7 e" g3 E6 aPosted Date: 10/22/2009 3 u4 I7 p% O" I
Department: IT-Admin
; [; x5 m8 G& B# z5 vClosing Date: 11/05/2009
: D' }# k9 ~. aLocation: Calgary 4 }7 ^1 e- H& O$ Q+ @ n, u3 e
Full/Part Time: Full-Time 1 k7 k$ U5 V/ D, ^& m% ~
Regular/Temporary: Regular : i0 j: ]: k1 L0 L$ ?
# Y6 a8 @7 e+ B% E; {Job Duties / Responsibilities U3 W3 q( i$ L8 K5 I
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 3 h7 A7 }, u5 L, m$ o& N
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; + Z7 C4 G- E0 |* z6 l8 ]! I
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ' ]4 y" A. c. }/ b6 \" G' U! s
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; $ m) n |+ X2 u( x# a2 d( Y
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 3 V0 g! A# y4 z& B1 b, ~' D- \, d
• Share best practice opportunities and provide an industry experience perspective; % j' B0 V+ i ]1 w/ g/ T: G
• Support and participate in SOX 404 compliance and Audit review activities.
- a4 ]4 v$ Q% d; k$ U+ k; A! G. @& F# T& o: I( N3 S ^
3 q- `/ l6 f* v% tEducation / Experience0 ?; I3 N: E1 \/ s8 W3 T2 D# L
• University degree in the field of computer science or other appropriate discipline; 8 O2 X' V# f/ L }/ \5 B
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
0 R, W! V9 ~) X• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ) v4 V w3 T U( V3 u' M. A
• Excellent verbal & written business and technical communication skills;
7 n, c0 k6 J7 A' i• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
1 {+ f7 m% j- M; g F$ J, r7 B2 o( v( R+ a6 x" R
The following experience would be considered a strong asset:
: A( H: w1 h# Y3 y: k• Multi-tier computing architectures and middleware technologies;
7 M; g2 r8 F% U8 @• Web-based and 3rd party access authentication mechanisms;
: E& E: \+ I: w6 o! w• Demonstrated technical and security solution leadership; . i! U: c' T5 D6 \4 o& J& C5 W
+ G/ h) L% h& L: D$ V+ `7 kEducation Accreditation, Certificates and Licenses:
1 s9 N. h+ x. q' y" B0 a• Possess or be working towards a CISM, CISSP or CCSP certification. |
|