 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ' Z& J5 C9 @: p% S& x
Job Title: IT - Security Architect C6 }# q6 S$ j" I8 _( c
Posted Date: 10/22/2009 ( X! a6 l p/ D' x$ C% L% I
Department: IT-Admin
3 ?: {. M: ~2 [ s# N$ HClosing Date: 11/05/2009
- A$ K. |. N' [- s" eLocation: Calgary
: v. \6 H/ R. N: W7 y* V8 ]2 eFull/Part Time: Full-Time
" e8 M9 y/ _! f7 u- E HRegular/Temporary: Regular
# c. L5 I y- R }" O% v3 }: G; W! d& l2 X- m# d
Job Duties / Responsibilities
) w3 e9 |8 w6 Q6 P' E: @• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
7 y3 O. m- X( U R8 \. H• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; `. a2 F! |1 s8 M. ]. A; a
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
' f' L5 l H$ Q U$ P/ f' w- `• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
" N; [4 u. ?" ?6 R, w8 q M2 S• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
4 D y) v) U: A! G5 P/ D+ s• Share best practice opportunities and provide an industry experience perspective;
3 I* M. V& U. Z• Support and participate in SOX 404 compliance and Audit review activities.. L. t1 y8 Y" e9 U7 F* K
. z4 ~4 p& ]* D+ M% w+ }" `, q( s% X% X( r" G
Education / Experience
; n i$ i) M7 C& G* o• University degree in the field of computer science or other appropriate discipline;
+ P8 S( {1 `& e5 O3 {• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; , Z( @: m( Q) D4 E2 s% \
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
$ b, _$ w; n2 I. }2 k1 e2 _• Excellent verbal & written business and technical communication skills; ( ?4 h& i/ e. z3 d* l* p. l
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. - q- a( @; U3 h, @
% M7 L% t; Q$ w5 j" k( wThe following experience would be considered a strong asset: + O5 ~3 W" Y" R7 d8 n4 T6 c
• Multi-tier computing architectures and middleware technologies; " o( I! h3 ~, ~9 ~0 \0 r9 {1 ^
• Web-based and 3rd party access authentication mechanisms; . i8 E; V' ?( f9 I
• Demonstrated technical and security solution leadership; " b6 H6 v; i1 V
; r1 E0 |5 ~; X* E2 \5 l+ k9 i- \
Education Accreditation, Certificates and Licenses:
, G% s" i/ ~. E9 y• Possess or be working towards a CISM, CISSP or CCSP certification. |
|