 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
* N6 Z$ V# l" _& @/ w! s5 T- RJob Title: IT - Security Architect * y$ w" ]7 K8 f
Posted Date: 10/22/2009
5 O$ N9 J# `( e: c5 G( ~* M# |; P9 P& CDepartment: IT-Admin 7 a7 M5 c; P/ I
Closing Date: 11/05/2009 3 O$ J- H, d- P0 N7 {9 _; P' I) d
Location: Calgary . \ `: ^8 a6 K3 y* m: e& D ]
Full/Part Time: Full-Time
: b5 P9 S/ }+ ~4 ?# Z Y5 T9 XRegular/Temporary: Regular : z$ I# k: v) f, Y, n j
- j/ _# R& L) I% t7 W
Job Duties / Responsibilities
! s7 m9 @ a, S- Z: j' q! }8 k- j• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
" o N% |1 A" @/ P2 A' j• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
" K6 H- ^3 ~/ E% X: g/ l$ D• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; - y) }9 j6 X0 s _
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 e8 O2 H: F- Q2 Q" t• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 9 d& _* g5 z% f5 ~9 p0 }
• Share best practice opportunities and provide an industry experience perspective; - M. m& d8 V7 S7 E
• Support and participate in SOX 404 compliance and Audit review activities.' Q4 K# H) f9 \# w* O
L( z) D8 V0 X- R
% S( S1 |, O U4 ~Education / Experience7 s* J( ~4 Y, Z3 j! t0 `/ Z* v
• University degree in the field of computer science or other appropriate discipline;
% ]6 `. P6 u: x( f4 r* V• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; & a- {: s! ] ^% _# u6 f7 k; j
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 U/ i$ F4 z8 A& b
• Excellent verbal & written business and technical communication skills; 3 p! W1 q( `6 b6 I1 F
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
+ U. G0 u i, S! w$ B- O; q1 J* ~# i4 U. o0 p
The following experience would be considered a strong asset: $ Y& u8 C* E5 O! ^& B4 Y
• Multi-tier computing architectures and middleware technologies; , g! x6 a' L! S9 N3 c \' _$ a: I
• Web-based and 3rd party access authentication mechanisms;
& m6 h9 s1 Z( n8 Y' r( ~• Demonstrated technical and security solution leadership; 3 d$ H" n% Q4 y5 k3 Q
; b4 j: v* j+ C9 u6 V5 @# X
Education Accreditation, Certificates and Licenses: ! b- w! T6 n2 j3 c: Z; d# P" v
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|