 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ Z! t. _4 W$ ]. o' d+ i; r
Job Title: IT - Security Architect
' N3 P+ K6 {' a9 q* }; ePosted Date: 10/22/2009
0 s2 ^ V4 ~3 Z4 y, f1 J6 d5 yDepartment: IT-Admin
s, g# \& `% C" W6 G. UClosing Date: 11/05/2009
+ f7 i# g T4 W$ v$ Z% v6 BLocation: Calgary 1 V$ a8 k# T7 q' P; e- M
Full/Part Time: Full-Time $ ?2 x/ n2 ?" V! @- F" @' n' X
Regular/Temporary: Regular
- ^# l# Q6 C- c3 B% H, @( i4 w+ E% _9 M. n
Job Duties / Responsibilities+ [9 `' A3 t9 ?/ @1 o& P' L8 l
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
7 n( L( ^2 N" U+ d% E; {9 H• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
/ R% M. u! p0 u4 z1 q• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
7 a% X* O0 ] Z* @; v• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 9 V+ d" Q5 A5 D5 Q
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 7 L! s3 l1 u0 m( O6 w
• Share best practice opportunities and provide an industry experience perspective;
' s; m1 s+ b0 L* R; @0 O$ T• Support and participate in SOX 404 compliance and Audit review activities.. }! t4 c! I4 v. Z
3 V6 G. [: `7 w. u. D/ k
6 i7 E0 k( R1 ]4 H( S6 P
Education / Experience! G/ O/ H5 v1 T4 x* c8 R/ l9 k
• University degree in the field of computer science or other appropriate discipline;
3 P& e8 J8 F0 C# `; p" K( W' c• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, ]# I0 k) O! j7 T1 I: g4 M5 U• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; / F+ A; Q& m' i: J
• Excellent verbal & written business and technical communication skills; 1 ]0 l4 u- \* @! M8 X
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
9 n- w- m/ g$ W7 C1 }7 d' d3 ^
( x4 ~3 ?& s' }( N3 _5 a; \The following experience would be considered a strong asset: 4 ^* ~% B2 p9 e* X' |( o
• Multi-tier computing architectures and middleware technologies;
) |3 C( Q$ t* Z* h6 o* e• Web-based and 3rd party access authentication mechanisms; + g4 I# T3 O! j/ P2 {3 o1 [
• Demonstrated technical and security solution leadership;
: F8 U6 [) N: W& e) w! H W4 C
7 b, `3 C7 R; MEducation Accreditation, Certificates and Licenses: $ C: F5 P h$ @( `7 z6 p- t
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|