 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
- c' X l: j4 X4 L2 f& [Job Title: IT - Security Architect
: \5 Q( ?& X5 W NPosted Date: 10/22/2009 ( u+ E9 ?& c+ E# S6 X
Department: IT-Admin 5 J+ L5 ?; E) }
Closing Date: 11/05/2009 D3 n, M* U) _. D, N
Location: Calgary
M) b- B) E% c0 BFull/Part Time: Full-Time
" w$ J( Y* S1 gRegular/Temporary: Regular
8 y6 Q& d. n1 k3 E! ^8 [( O ~
, i% T/ H0 M E. w/ f O8 g; hJob Duties / Responsibilities" C- w8 [/ p7 [1 V, D
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; . ~6 D# q4 f( ]) ?' z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
& V- m% p$ `# p; h" S• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ) w7 G/ t$ u" r! I) z9 Q
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; # W: A+ X7 {: Z8 \, C* }8 x
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
3 |$ k: D3 `6 b+ g; P• Share best practice opportunities and provide an industry experience perspective; 8 C( p3 u/ c3 e9 x/ S/ `
• Support and participate in SOX 404 compliance and Audit review activities.7 I. s' Z" {3 F% Z
' W5 K: p* ~4 |% r- l5 w, @
4 I/ _# }9 S$ p9 [4 m. H1 VEducation / Experience
2 u$ X, A! J& k) ^) I! W9 Y• University degree in the field of computer science or other appropriate discipline; % G7 g8 K4 e* M
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ) [) }9 M+ a' I
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 ^$ d+ R4 Z6 L# f6 O: z1 T
• Excellent verbal & written business and technical communication skills; " X' O! f h. a& @- v
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. : l! z- Z! s. X( `
@& C. s: z* A+ X \
The following experience would be considered a strong asset: 4 B% E# {& M$ \/ }' ^
• Multi-tier computing architectures and middleware technologies; - i& i; o" y2 S5 ]& m* A
• Web-based and 3rd party access authentication mechanisms; $ r; H0 L2 R/ v W" W
• Demonstrated technical and security solution leadership;
8 H* k/ k# R' s' Y. n& j# ?3 x- B' D/ J% I
Education Accreditation, Certificates and Licenses:
, o. w' Q5 h, v( D7 Z1 c• Possess or be working towards a CISM, CISSP or CCSP certification. |
|