 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 7 W- q9 Q; [. I' X' r
Job Title: IT - Security Architect 5 h$ z z* C$ w' t& [
Posted Date: 10/22/2009 1 I4 ~- `; z' Y5 }* f
Department: IT-Admin
. U' _) ]8 b3 H) C) ]+ U0 pClosing Date: 11/05/2009 7 s, q) R0 Q' @
Location: Calgary 2 x f4 ^% g$ J! \
Full/Part Time: Full-Time 4 f) t$ S! I) c+ C/ R/ \- [9 O% f
Regular/Temporary: Regular
0 O# Y* r3 _% i3 S
9 n d; L% C/ A9 b UJob Duties / Responsibilities
/ D2 s: T$ ^( F. }) x• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ! [7 r) d: T2 i7 r( F0 B8 U
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
0 h! f6 w0 C/ e5 h3 d6 d( w• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" `: l! P4 m# \% n• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; % I2 B4 H- S) O
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 5 B' q: c V! w. G5 m
• Share best practice opportunities and provide an industry experience perspective;
# o, J2 T/ [9 I* `" L• Support and participate in SOX 404 compliance and Audit review activities.
9 d D8 Y) J9 ~0 E( ~: h
A1 F. {- [; B' |+ A" ?+ N5 I9 u8 `, R( i" ~# B) Y
Education / Experience* w3 y) m# V( r
• University degree in the field of computer science or other appropriate discipline;
4 l! S$ T0 J, F* E: K$ r2 _) L• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, T8 `" X- T1 z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 0 P& E! Y" W. v1 [4 `2 G
• Excellent verbal & written business and technical communication skills;
3 A' ]9 ~& ]: ?• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
: ~. I1 ]1 S5 e4 }- h7 i$ N8 u. E2 P) ~: z- A3 x
The following experience would be considered a strong asset: * p9 j5 E, R2 q, ?
• Multi-tier computing architectures and middleware technologies;
. ?" m4 Y/ q8 c$ `8 w `• Web-based and 3rd party access authentication mechanisms; # l5 F! i# w3 h5 V- i4 w# W5 I
• Demonstrated technical and security solution leadership;
5 c) G' {1 Q) b& ~; ~1 l @9 s* p2 r; w* f! \5 P7 F) N! ~) x
Education Accreditation, Certificates and Licenses: ; v* W* \! _7 Q' g" B& |$ r
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|