 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 1 G" X1 ?8 b, i
Job Title: IT - Security Architect
) S, w; z8 X3 W7 c- {; F/ APosted Date: 10/22/2009 2 Z9 `. g3 E x( [5 X# d' R
Department: IT-Admin 5 n; ?) X. h$ U
Closing Date: 11/05/2009 . Y' O) P' ~- a9 y
Location: Calgary " D3 V* r3 r8 F, ^2 g; n
Full/Part Time: Full-Time . X% E8 K q7 o1 O
Regular/Temporary: Regular
' m; b9 {- q% _) o% ?! R) {; v: K+ `' s( W5 |
Job Duties / Responsibilities
0 p' R1 x7 y. j• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
5 \" K8 T k, p• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; , |6 g$ `& @$ P; Y9 A" N( M: q5 @2 m
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
. ^# _' u8 X* w# V( K8 I$ N• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
6 C& \" q( }3 C, }7 u) g& ~. f• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
" m; D; G0 M3 u$ t& k- _• Share best practice opportunities and provide an industry experience perspective;
3 E* A+ p7 [: o0 u6 u• Support and participate in SOX 404 compliance and Audit review activities.0 q4 F- E7 Z$ h( F. g( X/ D% Z: Q# p
9 _, I: k3 h6 q
* y, c1 g5 B8 D% n" N9 X3 ?Education / Experience
& i0 N; t1 v4 z0 k3 [• University degree in the field of computer science or other appropriate discipline;
/ t1 S0 o2 }% d5 @) W/ ~• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; $ i/ [1 v) [3 S. F9 i: @
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
: ~) i- g8 J- R& T2 ~5 a# X• Excellent verbal & written business and technical communication skills; 5 _: H8 }, {% ^* L/ q) p2 X+ n: w- ~
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
: @9 x' S+ b/ X8 c" r# C/ K4 V- Y$ ?+ S* g( }2 \( Y
The following experience would be considered a strong asset: 2 [' K/ G& i% m9 K
• Multi-tier computing architectures and middleware technologies;
; P1 L6 Q. C+ r6 b8 R" n• Web-based and 3rd party access authentication mechanisms;
' T7 K# b, ?5 f1 L9 w5 y• Demonstrated technical and security solution leadership;
; [ @) L6 a* ~+ U1 B0 i# O. y ]) D+ ]. H4 J/ F, N
Education Accreditation, Certificates and Licenses:
$ _, N0 z; B4 X6 N' V5 N, p$ ?• Possess or be working towards a CISM, CISSP or CCSP certification. |
|