 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting & S3 s" [+ T# r# j8 ?, l1 \
Job Title: IT - Security Architect 1 W$ d/ G8 ~4 }: P
Posted Date: 10/22/2009
" C l: a. e2 A/ k8 ]2 {+ w! E/ HDepartment: IT-Admin
: ?4 F% P5 o9 s; q* dClosing Date: 11/05/2009
+ I q: q: @ E* |4 CLocation: Calgary ) c$ k! M3 g* r5 W4 T N
Full/Part Time: Full-Time ; j3 l, W" t% E a* v+ s
Regular/Temporary: Regular ( x* y% K; K5 m8 [7 o
( i% z' l6 B) A
Job Duties / Responsibilities4 V: Z% f; f# F+ B
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
& m$ A- t' y1 F+ l5 p o4 t: m& M• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ( e: \1 g! _/ l$ S% L6 U( F) t
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 8 Y, y6 m9 p6 ~) U% C# c
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
* _: e, y1 k" \' a" n• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; + r' F# t1 }! Y
• Share best practice opportunities and provide an industry experience perspective;
; p! \6 G! E9 }$ r• Support and participate in SOX 404 compliance and Audit review activities.& z; u$ a5 m4 [
: s% i' V' Y6 L0 i; T6 X1 v/ h/ _5 n h+ z& ]
Education / Experience
7 ~# G% P5 V/ H! m• University degree in the field of computer science or other appropriate discipline;
" F% U* H: a. r# E• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
4 ]/ R/ {- D' u& Z1 Q• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
0 {1 |" R% p+ ~4 W! n! b• Excellent verbal & written business and technical communication skills; . s( q7 G1 `! I7 s+ _- Y4 A# y. J
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
! z+ ]7 E6 O, e! O0 r
. A- c7 p. K% F& k5 ]The following experience would be considered a strong asset:
5 C1 L* \/ u- n- W0 r: L• Multi-tier computing architectures and middleware technologies; 0 v4 w: T0 O( Y8 g- n0 `/ s
• Web-based and 3rd party access authentication mechanisms; " f4 f( ^2 c, ?& X
• Demonstrated technical and security solution leadership;
: a5 G: T/ [$ d% `& f
. b' [1 x) U# s, [$ FEducation Accreditation, Certificates and Licenses:
6 B- i: j7 n2 J6 Q* Y, N" `• Possess or be working towards a CISM, CISSP or CCSP certification. |
|