 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting & P0 T v8 S( X3 p* C$ w; m
Job Title: IT - Security Architect
I' N$ Z$ m3 WPosted Date: 10/22/2009
9 `& N5 Q9 l0 a+ g" BDepartment: IT-Admin + p s, K3 ?! h" q
Closing Date: 11/05/2009
/ R+ N2 I6 e4 b9 R7 eLocation: Calgary 2 X r& r- c, [ w8 v% f9 P2 W
Full/Part Time: Full-Time
* f1 s+ u/ s$ L5 u+ U1 W& ~* r, wRegular/Temporary: Regular
6 t" M5 S4 ]# L& s% V+ B, _7 k# F- c5 n$ M$ l' L8 w1 {! z/ k
Job Duties / Responsibilities% R+ g# @5 j2 i. Z( w) b, Y- s
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 5 P# O6 @3 D) {- V4 F! p! c
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ' `3 Q: S7 H" v
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
9 i2 b8 p3 P E% {" _1 i& C% N* ]• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; . @! s3 w# E$ N3 @
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
4 A5 h4 |0 C5 O, p, M• Share best practice opportunities and provide an industry experience perspective; 3 @1 r* M- w4 Z5 O2 [4 S7 H! U
• Support and participate in SOX 404 compliance and Audit review activities.+ q+ h8 W7 X4 F+ M
- b; M- B( A0 h2 X9 Q7 {, V7 `
" b+ r* Y( }" H R- J
Education / Experience
: y2 J/ N' h9 g7 n) B• University degree in the field of computer science or other appropriate discipline; + [! e! `5 P: \& G# F
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; / f7 L# P n6 a( s5 ]
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
; h# S( \3 Z0 A' Z) T• Excellent verbal & written business and technical communication skills;
1 |2 N7 S4 b" w8 I• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
. |' o6 @/ ]+ T" c% l* L: F" O$ L# v. y2 O1 X3 P: g
The following experience would be considered a strong asset:
- m, R+ U8 H1 p4 m5 ^# Q• Multi-tier computing architectures and middleware technologies;
0 o1 Z. A5 N+ V5 M! X- \& S; ^• Web-based and 3rd party access authentication mechanisms;
& G+ u. Y0 q* o6 i7 L• Demonstrated technical and security solution leadership; ; U: q; a) D% ^4 O+ _+ N+ f
! e9 ~/ r$ }6 d2 g7 s2 X' |Education Accreditation, Certificates and Licenses: 0 ]* e+ I* S! Q5 F, C' i
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|