 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
# c. G6 j5 V& X- ~Job Title: IT - Security Architect . @4 d/ N$ j& I9 J! D
Posted Date: 10/22/2009
, b) ?$ l6 a7 y9 QDepartment: IT-Admin ; w2 x$ e: Q$ \% P( Q' N0 ?
Closing Date: 11/05/2009 # i9 m+ y9 P3 |" q; [ m
Location: Calgary
0 F8 v0 v6 @5 H4 ^8 VFull/Part Time: Full-Time 6 |; C/ C O; R; k' n
Regular/Temporary: Regular 9 R1 C# s& `* T% |% h
% I# r, B i$ C! k
Job Duties / Responsibilities
! |' ~+ W- s6 G" N( U. g• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
' x6 _- S5 z* G* U• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; / J7 ~5 s6 X& h- T* `
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
' Z6 K* v4 {" m1 V/ |8 V• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
/ j; c4 E+ ^8 {3 t& }• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
a0 c# b% ~& } Z/ F• Share best practice opportunities and provide an industry experience perspective; : ?/ J+ ~1 \' @" e* {, v
• Support and participate in SOX 404 compliance and Audit review activities.# x# b$ B- e8 A, a* s% i; @
' s# ^, h; D* d6 `% T- p# B
( h; _& u% {9 @) uEducation / Experience$ v- B; S7 g) Y
• University degree in the field of computer science or other appropriate discipline; $ l. @0 M' `; p) j. D' l S. G
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; / P: C- B+ Y" Z. G, |* m- }/ |
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; % i% i7 D1 I4 M0 ]6 a! Q8 a" m
• Excellent verbal & written business and technical communication skills;
' `: W8 Y' s7 X8 P• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ! y( X; ?- _9 u# K: L3 H; z
4 t* @* l4 `! g1 H& t
The following experience would be considered a strong asset:
4 ~ s% r$ u" F0 \4 v7 x y6 p• Multi-tier computing architectures and middleware technologies;
: j/ }' B5 y1 P$ E! k/ M; q+ Z• Web-based and 3rd party access authentication mechanisms;
# j- ?5 b4 C) P" m) o1 j; c• Demonstrated technical and security solution leadership;
" c- v3 |$ _* P" j! F2 b5 \& t k6 S- V: _
Education Accreditation, Certificates and Licenses:
0 g% @" @+ _+ @0 _2 D• Possess or be working towards a CISM, CISSP or CCSP certification. |
|