 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting & M" z: V; q9 X* |" g/ U# Q
Job Title: IT - Security Architect
6 Y5 V5 Z0 m4 b1 xPosted Date: 10/22/2009 ) d' j$ h6 e" @8 v$ j- T
Department: IT-Admin 0 B+ i3 t( B4 [5 y+ L* F
Closing Date: 11/05/2009
7 C0 c% F4 ?1 mLocation: Calgary
' E) d1 {8 l0 z- HFull/Part Time: Full-Time ]& R4 ~# q: }" h) a5 w/ v; H
Regular/Temporary: Regular % s- h0 O$ o3 @' H }
" Z. L! ~4 Y* e7 P8 z" `: `Job Duties / Responsibilities) J: P$ @& [9 G: j' U. N# a7 I
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
/ [# R3 r* X6 Q& U7 M# | S% _6 _• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; % L9 ~$ h/ C8 q8 t* s0 N( O
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 9 D* Q: @) |1 ^5 [
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; * \: b0 J( e2 Z* k$ E9 o% Q
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
' w8 O# Z8 g/ z6 \( Q/ X• Share best practice opportunities and provide an industry experience perspective; 4 s- M) ^4 w2 K( T8 J
• Support and participate in SOX 404 compliance and Audit review activities.5 b# K2 m2 Z% p+ X
3 D: h" G4 T4 ]
: J$ ]; x+ p2 @3 H3 t: DEducation / Experience9 o. z) q6 F2 V& }9 w
• University degree in the field of computer science or other appropriate discipline; 3 M, C9 ?9 o+ N2 p* G; h" @* h. s) f
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 9 a+ `5 @ [; A; r3 B( V8 g# |3 }
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 Z! _. B+ x1 U) r7 i$ _* R
• Excellent verbal & written business and technical communication skills; ' _" c, T* M- f& N a: X: ~
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 0 \( V w C3 L# A
% g" H5 p% @ I ?The following experience would be considered a strong asset: 9 L `- t, f7 N
• Multi-tier computing architectures and middleware technologies;
0 N: W7 \) h* V) x- B• Web-based and 3rd party access authentication mechanisms;
. k2 c' F) N8 a. d& A$ m3 a5 ^$ g• Demonstrated technical and security solution leadership;
$ Q" d& D) `& u0 P; h$ `2 [& B8 w- _3 t' Q0 o0 }3 T- @1 }8 o
Education Accreditation, Certificates and Licenses: & d8 A" D& N7 n+ v+ Y2 m) Z
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|