 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting / x. ]9 A1 j9 G/ `
Job Title: IT - Security Architect
8 h5 l2 m- ]. l3 Q D; BPosted Date: 10/22/2009
4 C: T+ u! j$ L0 Q& ADepartment: IT-Admin : T B, j+ t+ m, {& `
Closing Date: 11/05/2009
7 o7 A+ V! O zLocation: Calgary
# h4 O* K) [7 ~0 F& P' e4 qFull/Part Time: Full-Time + Q5 b9 F) l' a1 ?# b. y/ h
Regular/Temporary: Regular ; P4 N$ Z* y& B, R
, e) C- }* ~: L- X5 G' C
Job Duties / Responsibilities
- ~3 K, b4 _5 @. C• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
0 `3 v5 K- b4 F/ t) N. e• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; * y% V0 V! k1 v3 C, B+ `
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; & ^7 Q' e9 s! d' O
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
* l1 d3 G8 e3 Y1 W; ]• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; % x! ?. g7 e; T3 z h9 x
• Share best practice opportunities and provide an industry experience perspective; 8 o8 Y! x. T. W1 T. O. {0 _
• Support and participate in SOX 404 compliance and Audit review activities.
0 C# s0 n; p2 ^6 T: M) w* _
% l) z4 i! `* b* h$ `/ i& K, H3 P9 | |! \
Education / Experience
5 [2 C* J3 b2 n; Z) }0 M, L• University degree in the field of computer science or other appropriate discipline;
4 u/ ^ y5 a* ~4 ~( U3 f• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
! k! E7 W8 Q, D" x% N8 E# F• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
" J. \( j2 y1 I- l• Excellent verbal & written business and technical communication skills;
- x5 ~1 P1 d$ U& T# G% L/ C• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. " @. ]( s( l! K1 b% d; a
. @0 U4 k3 A1 C) jThe following experience would be considered a strong asset: ; |2 n; s/ g) p3 R$ r
• Multi-tier computing architectures and middleware technologies;
" N k/ J. w3 w( J% A9 T• Web-based and 3rd party access authentication mechanisms; 6 w9 b4 X" C2 `) l4 Y1 U1 G
• Demonstrated technical and security solution leadership;
, R6 T6 V5 t5 ~ R' |/ k, E' b. D8 g8 r* w O# g
Education Accreditation, Certificates and Licenses: ' h a4 m6 m# c& P) j; ?6 M
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|