 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
% i/ }* F. t. B X5 _Job Title: IT - Security Architect
/ j r% M2 J# k4 N$ _Posted Date: 10/22/2009 ! l0 b5 r3 u3 m% o
Department: IT-Admin 3 Z* p8 H& }" H' j5 Q7 d9 p3 O! h4 N2 b
Closing Date: 11/05/2009
1 b3 W) f9 i1 X" o+ f/ yLocation: Calgary 5 H, ~1 z6 \, X/ P# W3 ~1 ^* u# e
Full/Part Time: Full-Time ( a3 ?- F9 l, a+ ]
Regular/Temporary: Regular
. U2 T- s1 X6 l1 n2 q) o/ U9 G) o9 u& N+ F0 N
Job Duties / Responsibilities5 e; q: P/ a& |) T8 Y+ k, b5 ^
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
4 ^" `$ R0 }3 A$ n8 _• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
) n9 |; @; r0 T' q) q! Z r4 F2 F" H• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
4 W/ |* r% ^! h; n• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 c" p- @/ }. A$ y' ]• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ' ?5 b" _+ i& E: ]; f
• Share best practice opportunities and provide an industry experience perspective; " t: Q2 F0 Y( Z# A
• Support and participate in SOX 404 compliance and Audit review activities.- |# Z6 a( x) Q: @
- V ~2 v0 O; E5 D7 @8 @
, w: _: P% P" oEducation / Experience
5 X# i0 j. k/ \6 {• University degree in the field of computer science or other appropriate discipline;
8 e+ E6 H- I1 W( X• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
' z4 A7 J% D8 y* c• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
0 g; C- ~1 i. _6 J7 e9 w9 A• Excellent verbal & written business and technical communication skills; 3 O2 j5 b3 q3 \' }
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. / O {: R9 f. D: \9 B. ~4 c
: `# P( j, p; d+ R: I$ |The following experience would be considered a strong asset: - F/ i/ y4 _, B5 }1 f
• Multi-tier computing architectures and middleware technologies; 4 O8 v9 l; E% a- h8 T8 \ D {$ w( q
• Web-based and 3rd party access authentication mechanisms; : r4 p: i# h, z' u. ~
• Demonstrated technical and security solution leadership; - q& k) M- F& n5 ~5 m4 t. E0 V3 d
! D1 Q- I3 W( K& ~. z1 P+ d! xEducation Accreditation, Certificates and Licenses:
9 M1 o: z2 k% ~% m• Possess or be working towards a CISM, CISSP or CCSP certification. |
|