 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 3 s- z) g2 r# n
Job Title: IT - Security Architect
4 }. B; e0 N# z5 m iPosted Date: 10/22/2009 $ L: ^- T8 @# {5 n
Department: IT-Admin ) }1 y9 @, o$ f) d8 [5 s
Closing Date: 11/05/2009
" g5 _$ f0 k% Y* e+ U5 L3 tLocation: Calgary
$ A! b0 P7 R7 l, H4 T+ s) A5 BFull/Part Time: Full-Time ) T1 H0 r/ X, A! e4 x
Regular/Temporary: Regular 3 E3 k. S* l- P' }" J3 X% t
( J2 E/ J& }/ E1 @Job Duties / Responsibilities& E0 N3 \0 n8 E: o0 A9 }: W
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
! S6 K, t* B. v• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; # o/ G+ A% [8 ~* k P8 Y
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ U1 \/ ?0 Y, O$ P R6 c
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
4 a; u' ]! v/ J7 Q+ I6 V4 @• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
1 V5 |$ u7 p1 I: B• Share best practice opportunities and provide an industry experience perspective; * c- @( I6 I- c2 C0 t3 ]' i; Y9 a, I
• Support and participate in SOX 404 compliance and Audit review activities.
3 Y$ P& `8 w5 {. U0 L2 X; s: b2 u [9 s1 |5 e9 b0 S1 o; V
, ^2 u+ r+ W3 L7 P3 A4 J! j0 fEducation / Experience) R# ]8 g6 K$ d$ K0 P' a
• University degree in the field of computer science or other appropriate discipline; 3 B, ]8 a) t, T
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; . y) L2 Q! ?' {; J# g- ~% r
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
. i+ C: j8 }, o% L; C$ t• Excellent verbal & written business and technical communication skills; * `# ~! P, Q$ |+ Q6 K/ j
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 0 b- |7 G6 k! O# a8 ~' w, V5 e
) T; I- G, J: F7 M eThe following experience would be considered a strong asset:
( O3 U( T5 x: k& v I7 K% o, W• Multi-tier computing architectures and middleware technologies;
9 i; m4 p* c$ ^1 G* m5 z5 a- c• Web-based and 3rd party access authentication mechanisms;
- W* E8 n* A7 X4 j6 ^• Demonstrated technical and security solution leadership;
- H+ q% F, U. l L/ Q( m7 O
: {9 _/ z7 U+ D" EEducation Accreditation, Certificates and Licenses:
! S% Y, a4 ?! V( R• Possess or be working towards a CISM, CISSP or CCSP certification. |
|