 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ! Z: C0 k2 |) I
Job Title: IT - Security Architect . h. X: F4 ]& O0 T7 ]5 X; a
Posted Date: 10/22/2009
, [ V$ Z0 ^8 r- Q. F; wDepartment: IT-Admin
% N% x$ N0 K) ^' Z8 b# }Closing Date: 11/05/2009 + `) [; h" k- Z' q G5 G3 S
Location: Calgary ( ]- ]4 F, K8 c1 I) C7 s
Full/Part Time: Full-Time " x7 ?; o8 N+ N, T" E9 R6 K
Regular/Temporary: Regular
7 @4 k0 f3 B' h' d9 J: D( F
y9 a7 `1 r4 E3 b( JJob Duties / Responsibilities
" Z2 m5 q" q7 a8 f• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
, _( }9 d0 v& _& L# r4 E• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
7 y# p8 `& V( c$ ^' y; }# d• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
, K5 G) {6 A, N3 `) g9 u7 {4 O; H3 M• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
& ?) p. V& t* _! N• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
/ T" X( `1 h: h! a* ~3 J2 A• Share best practice opportunities and provide an industry experience perspective; 0 S+ E* R0 c: G. \3 G5 P- C
• Support and participate in SOX 404 compliance and Audit review activities.4 H1 W, ?% W- h
4 A( u x0 T2 |/ h X7 T& J
* t$ ?- G* T6 ]& a
Education / Experience/ | |4 g( B* L
• University degree in the field of computer science or other appropriate discipline; 8 o9 `" f$ { a& ]& z, r; \5 R# \
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
0 p9 \. c. B; s1 T l0 F" K• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
" D3 q6 J/ m* K/ J• Excellent verbal & written business and technical communication skills;
6 a* `, }( }" r# d- c• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
3 I; V$ @9 l+ T0 y/ `( L6 H: }0 s* Y
, s: E; B5 K+ a/ a) }# s3 w9 \The following experience would be considered a strong asset: 5 ?3 ]( V" ^% B: l7 j& p
• Multi-tier computing architectures and middleware technologies; 5 E. e9 v0 q0 Q1 M$ U/ N9 D
• Web-based and 3rd party access authentication mechanisms;
4 i1 N* [- ]! H( x, d0 e4 ]• Demonstrated technical and security solution leadership; ! k8 i' ]; L+ a9 R$ |' j
M0 q" w% |7 `7 H' y& `( K5 BEducation Accreditation, Certificates and Licenses:
! }1 R2 q4 d/ m) J• Possess or be working towards a CISM, CISSP or CCSP certification. |
|