 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting / a! O& v; X6 h+ N+ n
Job Title: IT - Security Architect
+ o$ w* a; Z1 X& g4 V) x; u- yPosted Date: 10/22/2009 % n. k, z& f2 [7 H+ s- @" g/ i
Department: IT-Admin
) ^' B- \: [! d6 `8 ^" p3 `Closing Date: 11/05/2009 ( e5 }5 O1 T5 N1 A2 O
Location: Calgary * n4 e7 n8 Z# j2 I
Full/Part Time: Full-Time & n2 ^. V1 }) Q5 c
Regular/Temporary: Regular " _' G j8 }1 M+ f! I2 d9 `8 D$ F
! F# e1 y8 ~2 J
Job Duties / Responsibilities
! H) I* I n8 h• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 9 I2 `: G* _, K* y$ E
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
5 a2 x1 Y8 z" }3 t9 T0 s7 `• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ( P% q& r0 J5 g0 o, |
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 9 k* I" R8 G( w" Q3 i
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; . f% Y+ z& |3 _7 c$ l7 E
• Share best practice opportunities and provide an industry experience perspective; % _0 @+ U t# O" N, I+ f
• Support and participate in SOX 404 compliance and Audit review activities.
2 w7 p" r2 `0 t1 f9 V
7 W. u$ m* Q$ ^
2 S. a' e- N+ E4 B3 ]. \& `% mEducation / Experience
. S1 S, y+ W0 i% v6 x8 \1 t• University degree in the field of computer science or other appropriate discipline; , b' s& V$ s+ n# ?
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
' Y% }3 s k. U6 n5 S1 x3 R• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
( X$ ~) j- r$ |; L% B8 f) L• Excellent verbal & written business and technical communication skills;
# x/ k% w, Q/ {: [: q• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
8 C) z5 K% n4 W/ S
4 t8 s: S$ R J% o( r( }; oThe following experience would be considered a strong asset:
, u0 Z2 m# g2 U- m" c( S( i• Multi-tier computing architectures and middleware technologies;
2 u3 h0 X- H" g5 U3 W1 K0 }• Web-based and 3rd party access authentication mechanisms;
+ ~7 @: ]) I0 _3 O9 M• Demonstrated technical and security solution leadership; 0 W8 U+ l! N0 i( O' g/ b
* @: h8 M2 j9 P" \. d) I8 B2 H
Education Accreditation, Certificates and Licenses:
5 P! f3 w; h( {4 T' S• Possess or be working towards a CISM, CISSP or CCSP certification. |
|