 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting , d3 K8 O7 U8 ]% Z
Job Title: IT - Security Architect % [, h( H4 v5 O9 g Z" ?
Posted Date: 10/22/2009
" m ]. Q4 @6 P& RDepartment: IT-Admin ' o% T" z+ H/ v
Closing Date: 11/05/2009
- ]" r( e) i6 ~ E# d7 G: DLocation: Calgary : V2 Q9 A' _+ F/ o5 `
Full/Part Time: Full-Time
! }; U& Y- D1 M$ m% y! ^* SRegular/Temporary: Regular
8 [0 K+ G( O# J3 O$ x+ p- n, ?" h) U$ i% r' K9 [' e3 }
Job Duties / Responsibilities
+ w( L# V. X, j& W. s0 O• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 1 [4 Q! T. x# e- o& _* K- E
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; # P! W! w7 Y* e a9 v1 Z
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
: X; x! ]" b5 L* @+ l; o6 W) R• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; # W. {" l+ L- z$ }6 d/ u
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
( l$ l: l# h4 @, Y5 T. u• Share best practice opportunities and provide an industry experience perspective; # M3 g" q* {& Q; O
• Support and participate in SOX 404 compliance and Audit review activities.% D* {4 C2 S. y; v9 d( c W' \. T
9 J2 ~% W3 R. d3 a/ r8 w
. U3 H& ]! }8 W! z- x
Education / Experience
8 }; S. i1 f5 r: E" m# i! q( t• University degree in the field of computer science or other appropriate discipline; $ K& g0 \; c4 ^; Z0 [% c2 W6 ?; C
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
- w( f$ s8 v2 E0 G7 ?2 g9 b$ e• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 2 Z ^. t7 s1 k: H* ^! L" L
• Excellent verbal & written business and technical communication skills; 8 S1 {# t4 t* t8 y K7 C
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 4 x1 z8 t8 C& w- H
7 e( z( R- I: g) T# r5 F4 I8 A, lThe following experience would be considered a strong asset:
& N$ y$ U3 X1 m( Y• Multi-tier computing architectures and middleware technologies; % B( e3 X3 o0 |$ E$ Z' j
• Web-based and 3rd party access authentication mechanisms;
/ I B8 h9 H- `+ _7 i" g• Demonstrated technical and security solution leadership;
+ X% W& ^' }) \, U5 Q( o. Z" }4 w2 J& Z5 t
Education Accreditation, Certificates and Licenses: & Y: R5 h. e* T6 i# ?, ]4 J& @
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|