鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting # j5 J P8 J; k5 K0 U
Job Title: IT - Security Architect 9 s4 }( J8 @9 [
Posted Date: 10/22/2009 . z1 j; r2 Z% V$ C
Department: IT-Admin # I4 p" @& ?& h) N
Closing Date: 11/05/2009 0 t3 P5 Y' X. P* K! F# {6 d9 z0 D
Location: Calgary
3 H- \ ?0 F! y1 M+ h* s2 l" m% M) VFull/Part Time: Full-Time
. e$ o2 f$ `- G+ a. }5 v3 |2 tRegular/Temporary: Regular - p3 \' z, v o6 n( O f
0 N. U5 I, |$ d# T. B; [
Job Duties / Responsibilities
% a/ [" {# k+ s) U7 Q• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; & ]% M# E) r$ Q6 E5 h* J7 K
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
+ ?# K3 c& Y# s! ?/ _" w• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ m( @' F" L( s$ _) o• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; - q* R* R8 Z6 w8 t$ ?4 `6 A
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; & D3 w/ y& t5 ~4 p
• Share best practice opportunities and provide an industry experience perspective; 9 _; F! J1 y S3 H
• Support and participate in SOX 404 compliance and Audit review activities.
% K p* t1 z$ N U6 l: e
2 g2 S- Z) r* `$ M" p3 z: r* B J; ^2 |; x$ I# F
Education / Experience
1 P' c2 c' X7 G2 Z$ v• University degree in the field of computer science or other appropriate discipline;
$ \- {4 Z9 P2 G* |2 ?6 ]1 ]2 _• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 5 B' M5 m* W1 x. I/ ]
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
; S9 r. M$ W+ ~6 c) D R0 H1 u5 H2 S• Excellent verbal & written business and technical communication skills; + q- f) h( _; s/ @, i( C# t
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
0 k& `1 S+ b; B" j! R' \2 ?$ v/ V; [# E& x
The following experience would be considered a strong asset:
* @% h( h4 ]7 x• Multi-tier computing architectures and middleware technologies; ! h/ J# d4 f9 C q. L
• Web-based and 3rd party access authentication mechanisms;
7 B0 B0 Q2 M; f9 i* o# \% h* {• Demonstrated technical and security solution leadership; % C5 p2 c( o( ?; f- R
* g e. O6 I; N K) n- s* D" m
Education Accreditation, Certificates and Licenses: % D: Z% { x- a8 p ~1 ~
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|