 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
* j) B! n/ Y* Z5 D+ U$ W ?- SJob Title: IT - Security Architect
) S0 C- P3 x) n tPosted Date: 10/22/2009
3 Z* f( M" Z& D- e1 m7 fDepartment: IT-Admin
6 [" r) |5 _; Z# M' K: A5 IClosing Date: 11/05/2009 & i8 R9 L6 i2 }* M) }% Z% ?3 a. H
Location: Calgary ! `# ^/ d: A# J% A! g# S
Full/Part Time: Full-Time
$ ~+ q( J2 Z7 h9 JRegular/Temporary: Regular
. f% V2 Q0 a) d& F, [& a- `2 s S) ]6 ]1 j5 N1 ^& d/ e% [( T3 B
Job Duties / Responsibilities6 O5 V& g, q+ h C" b0 w
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
6 _' ?4 ]# x) ^• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
: a" {0 W' s- K# U! \3 y• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 2 W+ Y' ]/ w* ~1 ~ d( ~
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
1 S* }# x/ n( B& N/ x3 }: k, Z8 b; S• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
8 V0 {( B Z; f$ Z2 _; Z• Share best practice opportunities and provide an industry experience perspective;
, I2 J6 c7 ?# L- K• Support and participate in SOX 404 compliance and Audit review activities.3 |; O7 e6 a1 C7 a3 W6 \
, ?. A+ v: i1 g- `6 d# q% N8 B
3 t9 O/ o, {8 ^( f( D5 g; D0 O
Education / Experience& M0 p0 V: u# f! P" m! c, C
• University degree in the field of computer science or other appropriate discipline;
, {0 {2 [# H& e5 A• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 9 N, Y6 V0 H; k' J) c5 c
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 ]+ p) V2 T( e• Excellent verbal & written business and technical communication skills;
: v1 x7 d+ s# l$ t5 K• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
2 x* v. D7 M. _- _' N3 }$ D
3 s. q7 n1 A4 ]7 }' R xThe following experience would be considered a strong asset: % c3 V) j8 S$ g2 O) G2 w8 J6 d3 J
• Multi-tier computing architectures and middleware technologies;
: ^- O* a' z) S; {• Web-based and 3rd party access authentication mechanisms; 2 z' ]" U. ]# s, b8 m+ [
• Demonstrated technical and security solution leadership;
# I) f7 c+ j( {/ I0 O. {3 B
' g6 }$ C! ?6 Z& ~+ xEducation Accreditation, Certificates and Licenses: ! F- @# x; R' U3 u/ r
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|