 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting + b, l; w1 d f
Job Title: IT - Security Architect
" ~* k( C! l3 f. L' zPosted Date: 10/22/2009 & }9 j! j5 S2 ^" g8 y' q$ ?: U
Department: IT-Admin % y* l* E9 }3 {1 q
Closing Date: 11/05/2009
; O7 ]" p" f4 x! E' q) RLocation: Calgary
" Q; ~- V7 y8 M2 i1 W$ Y3 |0 aFull/Part Time: Full-Time
: X( H' m; ^6 {$ Y1 C- ]! @Regular/Temporary: Regular q" I! [- t$ E, N
+ D2 X5 [ I1 j- BJob Duties / Responsibilities+ Q; u0 D& c3 D0 b( {
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; + r0 z6 H; v! V' [' g% Q* x( _
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ; c' d: a) O5 a" e; H
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
7 }& v& E% P9 R% j4 d# q• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
0 u+ O0 D; @- N+ L. C• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 4 u! ~. A5 B# y% \ Y
• Share best practice opportunities and provide an industry experience perspective; 3 U( U; J1 s; S2 S
• Support and participate in SOX 404 compliance and Audit review activities.
& G/ ]# L* Y, y: y# O( v5 X, |0 F0 h u8 x
8 {. M3 J( Z$ H$ F8 v" u! V% IEducation / Experience
$ s3 i M! H. g) `+ X• University degree in the field of computer science or other appropriate discipline;
( }! S* E! B) [• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ( A9 x9 I8 s' t
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; . H& D( @8 K, k0 K7 p
• Excellent verbal & written business and technical communication skills;
6 Z/ v) o I9 O- G2 _4 q0 y2 n; A• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, _+ N" D2 v2 F3 g6 r& U
; a2 `8 Q8 t' Q) mThe following experience would be considered a strong asset: . d5 L" w% w* N+ Y. y4 f
• Multi-tier computing architectures and middleware technologies;
, N- @) T' g, j• Web-based and 3rd party access authentication mechanisms; [5 V, j3 b9 r5 O. ^
• Demonstrated technical and security solution leadership; 1 f6 F% N+ h1 ~& F- _' w: j
5 q( H% @( f6 g6 Y! q2 VEducation Accreditation, Certificates and Licenses:
7 G. O# ~2 s2 p" h6 P" \+ o6 ?5 R$ N• Possess or be working towards a CISM, CISSP or CCSP certification. |
|