 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
8 b0 A9 h. J; z1 fJob Title: IT - Security Architect 1 k* O1 W# m' x
Posted Date: 10/22/2009
" s! U' U: J9 cDepartment: IT-Admin
8 f7 e: q" Q( O* DClosing Date: 11/05/2009 ! T/ v& w0 G, v6 |" R9 K% a* L
Location: Calgary
5 m5 t; V) d, @2 rFull/Part Time: Full-Time ) |% F Q8 V1 p0 T9 i$ b
Regular/Temporary: Regular " H; H4 q9 |4 n( ]! s2 g0 m1 P
! Y7 Y' w/ ?5 X" o
Job Duties / Responsibilities
' `8 w# [- Q1 M6 O• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ; R, l& `& q9 H3 O7 ]+ X: \" L
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
`4 i# \" X1 i9 @ b• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ; L, V3 O7 A6 c! K& j; v6 m& `
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ! V: W2 G; H# a6 Z* s Y8 v
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; / X( D! o8 f" m3 b' e; w6 A
• Share best practice opportunities and provide an industry experience perspective; ) }0 L0 |' Z) n7 I
• Support and participate in SOX 404 compliance and Audit review activities.2 l' ?0 T! C! P- P7 m }1 _8 J6 C
: u2 [" H' n1 H: d: j ]
% a. m9 [, N7 s$ |/ k
Education / Experience
h+ r# }: M3 s+ K* t& Q7 D7 i5 Y• University degree in the field of computer science or other appropriate discipline; 9 P% e. Y2 f5 q2 t
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 2 M1 i1 `. V/ Q* j9 w M# q. b5 B8 f
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; * u3 ]% l& p$ q$ c8 F
• Excellent verbal & written business and technical communication skills;
' ]4 {7 T9 H( Z# b8 d+ |7 F) c( @• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
R8 Y7 v: q" Q$ C5 Z, t1 D5 ]- ]" _( f* y8 _ Z
The following experience would be considered a strong asset: 5 x' Z6 A8 z$ T1 g& y4 @
• Multi-tier computing architectures and middleware technologies; 6 Q5 e4 f7 _- w
• Web-based and 3rd party access authentication mechanisms; 2 C7 C9 o# @ G4 C8 E J
• Demonstrated technical and security solution leadership;
5 _2 g" A3 L/ S2 j t2 L5 `5 ^
1 I& Q6 U3 R' fEducation Accreditation, Certificates and Licenses: # M d6 H1 Z3 ?! [/ X4 L
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|