 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting + ]3 e7 B+ f( _# i6 `1 } v- x! P
Job Title: IT - Security Architect f3 b) O6 }! R4 |1 ?1 `! y
Posted Date: 10/22/2009 ! I/ N: ~2 w9 @/ ~
Department: IT-Admin . S& t7 Y1 ~ s
Closing Date: 11/05/2009 ( E/ k6 @4 ^3 C; k+ R9 ^: G
Location: Calgary
( X. |7 V5 @; Z/ s- h% e6 q" N8 ^Full/Part Time: Full-Time
: [5 d/ {8 U6 I$ p5 V# H! _Regular/Temporary: Regular J1 {9 ^* r2 u. `; t% G9 M
7 E; _8 X7 C" b7 C# C7 wJob Duties / Responsibilities) W- e. a! L* u% A; p5 \) G
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ; _9 P7 _7 q9 U& m* P
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
9 g! ?+ M: I6 C2 e9 d0 ^7 Q1 _% W( K2 e• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; # J5 B0 ^! w# Q. C, Q, w
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
1 s$ e5 x( y; ?5 I, g3 ^• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
' T3 w, C0 P! x8 c) w& t* l2 l• Share best practice opportunities and provide an industry experience perspective;
6 d6 V% e1 `2 k8 ]& C# V! J• Support and participate in SOX 404 compliance and Audit review activities.
1 Y& o- @6 ~8 i) r) V8 ~1 R- h
2 }" u+ E1 v4 D' m& @& A) ^1 o5 ^/ s3 a, P5 n# x
Education / Experience
$ n# ?* u6 ~: Z( l9 ^# T• University degree in the field of computer science or other appropriate discipline;
1 H ^/ A6 I7 E• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, T8 h t/ S/ r$ Z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 0 r: M" u7 \8 i5 d# t
• Excellent verbal & written business and technical communication skills; 4 M s0 t; j) T: j
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 1 j( d( v' B) N& d8 G& F6 _! P
! k' A& h- A1 e. ]The following experience would be considered a strong asset: , P: ?2 f @* w- ~! z
• Multi-tier computing architectures and middleware technologies;
3 g4 _/ @. V0 L8 D5 _3 `# I: h6 w• Web-based and 3rd party access authentication mechanisms;
4 F2 L" j* h0 o& Q5 H; f. N• Demonstrated technical and security solution leadership; : C# m" c, y j. `: U
1 i7 ?3 q- O* y3 ^
Education Accreditation, Certificates and Licenses: 4 r- d/ [# T% Q' b
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|