 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 4 y d. l* [/ u8 R- N6 D
Job Title: IT - Security Architect
# |% n6 n. z: m Z0 R( yPosted Date: 10/22/2009 " ^" e& N! s+ C9 {; I9 P4 M
Department: IT-Admin
; I5 N' @, E7 C, M% h9 z5 r9 {Closing Date: 11/05/2009 4 O, b# B2 t* _" d7 c
Location: Calgary
8 Y; `' t$ R0 \Full/Part Time: Full-Time
& U- n, ~$ z: J$ Z) P" IRegular/Temporary: Regular , M P* B9 S! b# `$ Y2 s& |, |9 W( {
! w h2 H9 M/ E7 K$ G! RJob Duties / Responsibilities/ \: D' Q4 H9 t7 n' K
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 k6 V+ N2 \+ |% ]
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
! T$ K) _- D2 ]9 X2 x# t• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
@4 }+ I' F& Q7 v* _• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
' O# {( Z/ A* a- v8 X( @# d• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ z2 B4 C* Y7 Y• Share best practice opportunities and provide an industry experience perspective;
/ B& G3 ~) n \+ l# E• Support and participate in SOX 404 compliance and Audit review activities.4 ?) V/ p" e# L! p t4 N, ~
) A7 M; ^! U/ X% j8 R `, t
, C; F3 s( K' f4 S- x
Education / Experience0 x1 C: B( T$ ~% [9 G
• University degree in the field of computer science or other appropriate discipline;
Z; A- ~+ g" K: H6 c# N• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
/ L$ P: i G0 i• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
" T4 ~- v# E& t! U$ }• Excellent verbal & written business and technical communication skills; 8 e# F( g: ]- B; q& ?
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. : e1 e% q1 Z9 M# L& X7 G8 h7 g
8 G+ |$ _% z }8 n$ aThe following experience would be considered a strong asset:
) F2 u: B0 @! t• Multi-tier computing architectures and middleware technologies;
, d$ Q1 D) ~- O0 b) e• Web-based and 3rd party access authentication mechanisms; ! S3 V- F3 r5 A# [0 k
• Demonstrated technical and security solution leadership;
, S J' r- D9 @* N8 ~( f
& f& F7 n9 ~) O4 ]; ~5 } BEducation Accreditation, Certificates and Licenses: # m2 _' u6 e9 f% W+ ~( N
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|