 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ; w7 e1 }% c; j
Job Title: IT - Security Architect # ~; Q0 Z) G& v$ A; E' e
Posted Date: 10/22/2009 & |2 p/ b! t8 T1 k3 o
Department: IT-Admin
+ z/ [0 P# K2 X9 |7 \Closing Date: 11/05/2009 ( y. N0 H s) c; A* a f
Location: Calgary
2 j4 {- w+ Z3 C. RFull/Part Time: Full-Time 6 U& |( i$ B, T$ `! u6 Z4 c+ E
Regular/Temporary: Regular
; D, W/ c6 d) N9 H
2 M/ x7 }, u! f2 ?' x0 ~Job Duties / Responsibilities
# P+ p% z& y/ V4 v! s, J3 G• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 1 O# b7 S/ l3 q' ~2 h# N9 k% a
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; * D7 g% N6 ]" ]
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ G: h; D5 A! p, r( l8 ^
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
: X3 P+ V6 u' d, M1 r6 f• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
" o \) w6 [7 x4 M3 V# K/ {• Share best practice opportunities and provide an industry experience perspective;
1 u3 A' W3 L5 z' C2 N2 W. ?% ~• Support and participate in SOX 404 compliance and Audit review activities.
# x! P$ ]: i9 r. y2 Y3 d6 N4 a" b5 D8 k; o f3 v. v9 c$ \
. v: Y& r6 [* M- Y% T7 p
Education / Experience
; V8 ^) E8 t9 q* s- L0 [; g+ a0 M• University degree in the field of computer science or other appropriate discipline;
6 I" h4 x5 A7 c5 y4 \• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; - N) T- V4 e- \9 u
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
* a `" S8 ]! Q• Excellent verbal & written business and technical communication skills;
! [3 o4 p8 ~, A8 t' S! I' Q• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 8 c: ]+ M$ E/ m. n
" q$ D+ h. M7 Z! f
The following experience would be considered a strong asset: 0 e$ t' f; p$ ?; h+ ?. u
• Multi-tier computing architectures and middleware technologies;
1 |; _) I+ ?* W- h• Web-based and 3rd party access authentication mechanisms; % ~# y- A S3 o3 p2 l% z7 e
• Demonstrated technical and security solution leadership;
, G: O* [4 i0 S- h3 K! o3 k& f# N' k) R$ ?/ _
Education Accreditation, Certificates and Licenses:
+ e" q1 |# n6 s; m( L! f" @• Possess or be working towards a CISM, CISSP or CCSP certification. |
|