 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting + o) _5 p0 W0 j, X0 ^
Job Title: IT - Security Architect 9 b4 @3 h0 V" V& z7 X
Posted Date: 10/22/2009
% x/ Q: [1 W+ WDepartment: IT-Admin
j3 }' ?/ Z3 l/ b4 FClosing Date: 11/05/2009 : b% y# H; Q1 L! C& A8 P
Location: Calgary ( I% O1 m& C6 p4 L% n" ^
Full/Part Time: Full-Time 5 i" S6 b# g8 P
Regular/Temporary: Regular
: R' m5 Q9 O) @) H! i: e8 @ l& N+ K' n* h3 t+ M
Job Duties / Responsibilities
; f+ O# N4 b' I9 \5 s, z3 h3 j' P• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
3 x+ [# }% O0 }$ z5 S" E• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 9 I% {1 V2 p: d, X2 Z, l
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
$ k3 \* `+ v8 v. _! Z7 t6 f• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
2 h$ M' U" `4 E( C; U, G3 b• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
: @" W; s' q2 m0 `# s1 w" h0 r• Share best practice opportunities and provide an industry experience perspective; s9 c/ s( q3 x( R
• Support and participate in SOX 404 compliance and Audit review activities.
( S5 J, X! I+ d6 T' V& t+ w2 f
9 g" u/ Z1 k1 \* C$ U/ Q8 b9 {8 }9 D0 f
Education / Experience( D- L2 m) S& A d" L
• University degree in the field of computer science or other appropriate discipline;
9 f% t6 u2 T+ j, ?2 I• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; / ]- @5 }3 a% e+ u6 k
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 1 I/ x& g! x/ e T
• Excellent verbal & written business and technical communication skills;
) ^( f) s8 I ^6 U, ?6 ~5 o• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. [: i- h4 Q: E# B, p" l" z* s
( I* U8 n$ R- W8 q5 e& G5 z
The following experience would be considered a strong asset:
* S( u1 X" D- l6 u# ~• Multi-tier computing architectures and middleware technologies;
; n6 L/ a( }7 @! x0 k• Web-based and 3rd party access authentication mechanisms; 4 @1 f5 V W2 e2 v9 S. b
• Demonstrated technical and security solution leadership; - `" E& O$ \% X0 D, G
& ?, t- p( r' M, H
Education Accreditation, Certificates and Licenses:
. R/ b, ~, C) v$ n8 f2 h( ?3 K1 k• Possess or be working towards a CISM, CISSP or CCSP certification. |
|