 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting A: H* @, d/ c6 x5 m- _5 @
Job Title: IT - Security Architect 0 K( J- ]- p3 [ p+ k9 u
Posted Date: 10/22/2009
) G( Y5 _1 d! @! Q4 g7 S( m. jDepartment: IT-Admin . I& S) l( H1 n
Closing Date: 11/05/2009
+ @: ?! P. e8 | k4 z& ?Location: Calgary . E* ?2 o* t$ Y: a
Full/Part Time: Full-Time
4 O+ g0 P% @5 l: W1 CRegular/Temporary: Regular 2 P7 f6 k' E+ f2 ~; k ~7 w
7 F- @ m. B9 O6 D- B. C
Job Duties / Responsibilities
2 Y1 t8 s5 ~8 m2 o• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
8 D! X$ I5 q) Z1 }• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
( ]$ t$ j4 j0 M' d4 R• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
9 e" m5 ]% a4 I& }• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
( ^4 w/ e- `, K3 e, {) V- e• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 6 y5 k5 q6 m: \8 p9 H r; m
• Share best practice opportunities and provide an industry experience perspective;
& `' U+ r5 Y9 O7 v3 `% M- ]• Support and participate in SOX 404 compliance and Audit review activities.% J$ b4 O1 G0 J% s1 B' i
4 y8 r, A! R' d/ H& u2 B5 U; l
& T: H' z5 _' O& MEducation / Experience# z, ]9 {7 X9 _; K+ c- @& r' P
• University degree in the field of computer science or other appropriate discipline; + z2 x2 V9 s [: a) [
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
" X) Y3 R. ^* i3 N• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
) F; a5 ~# e4 m# H• Excellent verbal & written business and technical communication skills; " d% U3 j* P. w# C: y- y$ [
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
! i7 }9 h$ b3 Y4 d4 q& w+ q( x4 R# `* v& @/ ~" f" t; [* S
The following experience would be considered a strong asset:
( [' y3 I/ n5 m( W, l• Multi-tier computing architectures and middleware technologies; ! W$ h8 t, f+ z6 B4 }
• Web-based and 3rd party access authentication mechanisms;
/ P8 e( q/ O3 \% j O h• Demonstrated technical and security solution leadership;
$ P, k# P. ~) s7 Z) d) H1 M' Y
, R# o4 D9 E$ _! N* z; M7 vEducation Accreditation, Certificates and Licenses: 3 f! x5 @3 d& K5 D7 f0 A& U
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|