 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
% Q+ y/ s% S' gJob Title: IT - Security Architect $ r- B/ i/ f$ u1 q- j2 u% t
Posted Date: 10/22/2009 & K5 ~/ }& \( Q
Department: IT-Admin
) z; H: X) c. D. l/ \/ TClosing Date: 11/05/2009 3 }9 p! M7 y Y2 `* {9 _2 L
Location: Calgary
+ B: T% ~9 b1 J# b9 M# W EFull/Part Time: Full-Time
# \* t8 Y5 m% sRegular/Temporary: Regular
" M) F( O4 Y0 {& s4 b( J) q7 r3 ]1 Q/ F0 n4 r2 B q# v8 x8 z/ j% z
Job Duties / Responsibilities
2 M( E8 k1 f2 ?6 w4 ?- D+ u• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
|, T" ~/ G7 V6 ^• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
1 Y; h: M2 x! e• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; # j5 N4 B. r! j, H& ]
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
* E# @" ^# m* f* N$ P$ O$ h" V• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
% `0 e* D1 E+ a9 i) e- c" k• Share best practice opportunities and provide an industry experience perspective;
( r5 {( g3 t2 j' I. C5 [! }• Support and participate in SOX 404 compliance and Audit review activities.% T8 G7 k' A. s/ n c) F
3 J1 w i2 m+ ^) _/ {/ k* ?' I
" x5 U0 E" n9 F! j+ I1 W0 FEducation / Experience
8 g( i0 m9 b- P! j/ d) U3 P4 b7 Y2 H• University degree in the field of computer science or other appropriate discipline; ; m, f, t1 _$ U
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
9 V8 Z0 b- S# G! N( |• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 3 @! t. R7 n% S6 r
• Excellent verbal & written business and technical communication skills;
7 t7 I- B- ^ @, b' |- _5 [• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. * Q, P9 R6 A2 {+ Z7 q, h& B" |
# e4 }. b! _8 R' ZThe following experience would be considered a strong asset:
& [: E' n; I; s- l1 Q• Multi-tier computing architectures and middleware technologies; ! w1 H2 \; J2 \, |& a) G
• Web-based and 3rd party access authentication mechanisms;
4 P l' S/ p' ~8 M q8 ^• Demonstrated technical and security solution leadership; 0 P1 f y/ e2 |( j* ?
# `- g. ? N; y' C7 U2 |1 w1 u
Education Accreditation, Certificates and Licenses:
" Y$ ^0 h/ V0 y/ @! w( a• Possess or be working towards a CISM, CISSP or CCSP certification. |
|