 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
2 l- ^& q7 h; VJob Title: IT - Security Architect . X+ T. r, ?- y9 K! G, B) w( ]
Posted Date: 10/22/2009
, _3 z2 z+ _% t+ HDepartment: IT-Admin
# V- u6 [* H9 R* }9 V9 NClosing Date: 11/05/2009
) Y* t f- `' c' @$ o7 r0 vLocation: Calgary ( q3 e% D: |! r: b' X3 J4 w
Full/Part Time: Full-Time
* q C0 a4 z+ n3 {Regular/Temporary: Regular + `5 ~% i; J( M; w4 `
5 j _* @+ m9 ^8 w
Job Duties / Responsibilities3 C+ @0 {7 h! L3 m
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
& ?! }0 V$ s! _5 l8 k Y4 L• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; " h( M: O; v9 H1 q
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
8 o- C) @/ ], W/ K% k1 t9 V, m• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ( O2 i" [' i1 S
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; . X% S5 n% l7 S( E, S: Z% e' H
• Share best practice opportunities and provide an industry experience perspective; : O, h7 y+ G- K% \
• Support and participate in SOX 404 compliance and Audit review activities.( O; t4 C$ G5 _7 L$ |4 v4 a
& m: a: a. d. x/ n7 j/ ?* @, A" C; b# Y3 l. x/ N( e& m$ c
Education / Experience" [1 V9 A, H6 K! w
• University degree in the field of computer science or other appropriate discipline; & ^0 V7 H5 ~+ \3 E( [6 l! L3 m6 i
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
9 ]- X3 E! F" X! p3 \7 t* X• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
9 S" ^6 l$ C% P6 o+ y6 |• Excellent verbal & written business and technical communication skills;
5 A/ h$ J7 D* c; ]6 q8 M• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
% j/ s7 f* Z( c" X% G& b, x6 w( D E: _9 ^& g
The following experience would be considered a strong asset: % e' Q. k$ o, s0 D$ X! e0 v/ Y
• Multi-tier computing architectures and middleware technologies;
4 C& }" y; F2 t3 I% i% Z• Web-based and 3rd party access authentication mechanisms; 8 _* G( H# E' \+ O; f- E
• Demonstrated technical and security solution leadership;
0 u1 H; J2 y( `, }5 V i) Q: y; ?& S+ W/ T: a
Education Accreditation, Certificates and Licenses:
" H$ o) d% _+ m S• Possess or be working towards a CISM, CISSP or CCSP certification. |
|