 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 7 K% ~8 f% I3 L; ^$ b3 S
Job Title: IT - Security Architect
" f# S. G" G7 n) GPosted Date: 10/22/2009 9 p+ I) _0 K8 Y$ `! \
Department: IT-Admin , D$ f" u$ V/ l( @, J
Closing Date: 11/05/2009
9 [ v. z5 d; l8 K# DLocation: Calgary " \0 j- L2 P+ m, S, u2 ~
Full/Part Time: Full-Time
! b2 _9 ]# X4 a$ T7 ~. g( ^* @Regular/Temporary: Regular U6 i, d; c x* G: m( u
. |$ e2 F6 E+ p V; J% r
Job Duties / Responsibilities# O# [& w3 t3 V# j
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
4 [9 r: s0 N+ _% F" E! N0 W, J• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
, {. F/ |, [% k& Y• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ {6 m* q s$ \4 `: Y
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
! C3 t- Z/ O( u( K t* [/ Z" v% g! \4 f• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; , x; ?: l; ?) w
• Share best practice opportunities and provide an industry experience perspective; : A3 {/ P( M' ]5 u' E8 O9 O" p
• Support and participate in SOX 404 compliance and Audit review activities.
5 R. q9 q8 p5 n: ]$ T* B$ j" |$ k- X- M( G) Y$ _$ q3 Y1 k/ K7 I
+ Q9 n- r6 v( C+ W& L( r
Education / Experience
/ U+ G8 a* r9 z6 G4 D9 Z0 E• University degree in the field of computer science or other appropriate discipline;
. i& u! |% i) B8 s1 E3 i• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ! N; J) {0 j a! F2 ]$ J% `
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 C0 {) I- g+ [! n/ ]• Excellent verbal & written business and technical communication skills;
7 G! k$ `* }/ q% H• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 6 L: d5 N4 c2 g- b# Z2 k. g- c
% r9 E0 B) x) i- J i7 U7 U2 \4 WThe following experience would be considered a strong asset: 7 y, s' U3 u" G: l/ Y
• Multi-tier computing architectures and middleware technologies; , V' C' c' `# w' A7 t
• Web-based and 3rd party access authentication mechanisms;
4 f' g5 P0 e0 c• Demonstrated technical and security solution leadership; $ Z% o$ R- N9 R: g- {. {0 F8 V( q3 \
' M) s9 r, |- ^) p) XEducation Accreditation, Certificates and Licenses:
' A6 W, M2 G% q# O8 p3 P+ V( K• Possess or be working towards a CISM, CISSP or CCSP certification. |
|