 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
2 p/ |% c z" e4 j, o# aJob Title: IT - Security Architect
$ ^7 A9 X# {+ ?' P2 S; @! B% Z; @Posted Date: 10/22/2009 " I9 n* y* K- n' D- c2 m: D
Department: IT-Admin * u& R8 t* p7 j/ A7 n
Closing Date: 11/05/2009 ( q; x* Y; R" W( N6 ~4 Q
Location: Calgary " {, P9 w0 _" W$ ^
Full/Part Time: Full-Time # C* e3 |/ G$ {9 z4 [% a8 E% H8 t" ]
Regular/Temporary: Regular & J& D$ M* `6 _2 X' G/ q$ O
: f8 v8 J# [4 [
Job Duties / Responsibilities5 j' l7 v* _- U3 Q# K! b4 u
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; S; [, }5 T/ e7 ~' M
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
" ^- ?2 |; r! u. @" f. n& ?6 `8 N• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ Y/ X" V) Q$ T- {0 B
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ! h3 |; W z( L- Q! y# D
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
1 y4 Q; X T5 t# ?. g$ r• Share best practice opportunities and provide an industry experience perspective; 7 w# _7 o S8 I
• Support and participate in SOX 404 compliance and Audit review activities.( O, `5 _+ y6 ~# \; L
x$ ` ?: ^. F% S* }; ~0 W& V! j% ]2 v6 v |) z( J
Education / Experience
6 C# h, x: @3 W* A; N• University degree in the field of computer science or other appropriate discipline;
1 @9 c6 b8 V$ Z8 O1 @0 ?0 e% v1 |• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ! Q- T0 Q% o, l1 {( J+ [2 L9 o# H
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
) `7 Y# K4 a( g• Excellent verbal & written business and technical communication skills; ) H. x! A5 T8 B7 E
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
& d! g( M2 r" H# n2 F% A4 Y" M: d9 q# Q3 _
The following experience would be considered a strong asset: P9 J& x g, V- l
• Multi-tier computing architectures and middleware technologies; 5 M8 L& r$ X' e
• Web-based and 3rd party access authentication mechanisms; & h; u) |( r7 r
• Demonstrated technical and security solution leadership; 2 _6 p, \* E* J2 O- Z
5 d0 e& R/ w1 v8 Y! q& h. Q0 u. IEducation Accreditation, Certificates and Licenses: . i# C3 ]4 o+ @: |* O( p% T
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|