鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting ) R( ~) i3 t" ]3 V0 `
Job Title: IT - Security Architect 2 v+ M7 S0 i, q" J$ P
Posted Date: 10/22/2009 2 G" {3 S: c F
Department: IT-Admin 6 P F, f% t; I1 {
Closing Date: 11/05/2009 Z" ]: Q Q8 e
Location: Calgary
8 A; V" [6 u9 v+ E1 G1 NFull/Part Time: Full-Time ) i3 N* w4 i3 T$ F
Regular/Temporary: Regular
8 @* Z+ U" J" M& A9 d8 s+ D) a; z9 {% h: C
Job Duties / Responsibilities: |6 S1 J5 d" U! N5 k& }% V
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 1 {) N* V3 q1 z, W
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ' I( D) A7 Z0 }. p. y @! A8 I
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; - |) q3 X& d, ~, w
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
9 {+ s. z' v# ?, U% F2 K4 r# F7 T• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 3 N2 T" J N( O. ]" g3 c
• Share best practice opportunities and provide an industry experience perspective; 8 U$ F$ y8 _/ P& N0 D$ o I }
• Support and participate in SOX 404 compliance and Audit review activities.3 T: O- ^! a; `
4 t# I B/ c+ D$ s) `1 R4 R2 ?
3 B# ^) I- f7 t9 @" xEducation / Experience" B$ r: ^* k9 v9 M
• University degree in the field of computer science or other appropriate discipline;
! @- ]% T: G7 B2 I9 k0 a9 X• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
2 p% L4 o! ]( S2 y& }8 ]- S! p• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; / g2 f$ s7 O" T: N" l. B
• Excellent verbal & written business and technical communication skills; # h2 y6 _/ g, c6 V4 I' i, x' P
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, f7 Q# p6 D0 T- P/ u: O) T) n) @. ^! } W
The following experience would be considered a strong asset:
1 n2 \+ G, X8 ]4 k, p! ~: |7 |• Multi-tier computing architectures and middleware technologies;
' k# ]- v, Z0 y) x2 V/ u1 d8 g• Web-based and 3rd party access authentication mechanisms; 0 i& x+ t, x; d2 {4 p4 {$ S
• Demonstrated technical and security solution leadership;
) q7 a: h. w4 X M5 p6 x. w7 ^- h3 i5 K0 M
Education Accreditation, Certificates and Licenses: / ^4 ^3 |8 Q7 V+ [
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|