 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
. j) ]6 c. Y6 ~Job Title: IT - Security Architect ' ~7 v( |3 f7 M) X5 i8 Y
Posted Date: 10/22/2009
: v* _+ I8 P, S! `4 qDepartment: IT-Admin 4 ~* [* v1 T% e
Closing Date: 11/05/2009 5 A$ ?8 J8 g j0 f
Location: Calgary
* _, i" N+ T$ _" tFull/Part Time: Full-Time + {$ u- j5 ^& w. W$ ^/ m' ~
Regular/Temporary: Regular
9 A' }- P& Q7 O R! D" Z% r H) D. D: f# i. G
Job Duties / Responsibilities5 H O1 [4 O: C. K3 y3 ?* D) @& H3 q
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 3 l4 D% @7 P! z2 j. G+ t$ q$ e
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
' i2 g) M6 Q6 b• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 2 R2 k$ I: U F. A5 R
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
/ Z" x: ~) y* h0 Q+ b; z4 |• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 2 N, W9 c3 g' E7 P: G. W6 d" @
• Share best practice opportunities and provide an industry experience perspective; ) j: \ p1 b7 ^( K
• Support and participate in SOX 404 compliance and Audit review activities.9 Q# @1 m1 @; _4 H
0 `1 k& ^# l0 r& {; N1 Q
" x Q8 S3 n) H4 N; O; N' V
Education / Experience6 G/ v& t# ^$ N( d! X
• University degree in the field of computer science or other appropriate discipline;
; ?4 F; a8 S2 ^' b: o• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
G3 {, s. ?; \3 h# A9 x8 t+ ]• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; " b5 V$ d( _' v- e8 f) e7 f) ^
• Excellent verbal & written business and technical communication skills; 4 \" s. b/ K# Z* R) t/ o
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 5 X* d& g E8 I; H
. z- p) g/ x$ k5 ~! I4 j
The following experience would be considered a strong asset: : ~( P6 H% l3 e, j4 @
• Multi-tier computing architectures and middleware technologies;
. V- o' i$ h4 ^7 w: T m/ N• Web-based and 3rd party access authentication mechanisms;
( B1 v- \. l4 \6 r2 M! B0 [• Demonstrated technical and security solution leadership; 8 V! F4 |1 B! x* |/ t# x3 E# P0 Q* w
# Z+ i1 y- R1 y( w: Y
Education Accreditation, Certificates and Licenses:
4 o6 b: O9 q5 j; T! A• Possess or be working towards a CISM, CISSP or CCSP certification. |
|