 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ) Y1 h, V$ a- h ]' T: V
Job Title: IT - Security Architect ( K2 O. [" O3 v2 S0 P
Posted Date: 10/22/2009 # [0 N @0 }, q2 q! X5 I2 U
Department: IT-Admin
* r: o3 M3 _' l! |: G1 nClosing Date: 11/05/2009 % X& Q- A, V$ K G0 |* Q
Location: Calgary 3 K& p0 R) O/ ^2 R; f) z$ k$ W
Full/Part Time: Full-Time 1 n/ z5 A1 w2 L0 G) B
Regular/Temporary: Regular 5 ^! f1 U) j+ A
; J# @. j1 M* y& o2 \; y; p; iJob Duties / Responsibilities
1 n1 G j3 F1 \2 }" q$ _• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ' s* Q# ~* Q+ Y- M: s: g
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
: \! Y% o) Y1 N( Q d/ v; c• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; . o+ B; V. V; X/ O
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
" V9 {- H' G% c5 F• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; , m1 x' T) v* J& g1 \, S Q0 s
• Share best practice opportunities and provide an industry experience perspective; : `: ~/ M' `8 x+ x8 @
• Support and participate in SOX 404 compliance and Audit review activities.
0 T- o% P: |6 k4 A; W) {* c+ L1 H8 {7 I: }% i+ i; h) {
0 i( S) t6 { @" k) ?' _Education / Experience
( j5 | k2 Y! N2 W- \! a! {; e$ w2 q• University degree in the field of computer science or other appropriate discipline;
" W- G" L* ^& _+ n/ s• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 7 ^( g: N% x4 i$ s* L4 G
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; + m/ h. K6 O) d0 q- s
• Excellent verbal & written business and technical communication skills; : f; S" R/ u* I& v X
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 9 e$ w$ N. H# n5 l" G; s
* t- M+ r7 \/ v% a3 a5 @+ @: WThe following experience would be considered a strong asset: " i0 ~: l7 a) X4 n$ s
• Multi-tier computing architectures and middleware technologies; * N& Q4 P# D7 Y, ~2 V+ c
• Web-based and 3rd party access authentication mechanisms;
! y: h. U: [* n) e- u: G* ?• Demonstrated technical and security solution leadership; 5 k7 ?* c8 b" Z) }6 y
; J' Z1 I0 _/ @ O0 t. J. o4 V" ]Education Accreditation, Certificates and Licenses: + a! u4 E0 ~% _. M
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|