鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting 7 O K3 @ p3 s1 Q e; l" [
Job Title: IT - Security Architect $ q: E% Z' T, N0 w! g2 f
Posted Date: 10/22/2009 , M) ~. R9 j$ h2 W8 N5 D
Department: IT-Admin
! ?/ h, m' ], i3 Q, s2 {* q" hClosing Date: 11/05/2009 + [& o0 y; [) n0 ^6 j: J
Location: Calgary / n, ^$ Q1 ?( y& l: R
Full/Part Time: Full-Time
4 \% Y7 y, [$ l7 i/ sRegular/Temporary: Regular ; |* K$ \+ j* C& c3 c
& w: X5 p1 |' L9 u9 T6 A. |: FJob Duties / Responsibilities
5 \( D% Y* n' N4 {1 z T• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 g+ P$ J" g3 m! X% x: C8 q
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; " X& d5 ^) {$ N- q. o) e% ^ T/ [. o
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; : s. Z$ A$ G5 n- U% M5 C. T
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ' X! y" s6 x# i
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
0 _& f b; f- I; y) O0 I2 w• Share best practice opportunities and provide an industry experience perspective;
8 R3 D8 ^9 A; @: C) t4 c; W• Support and participate in SOX 404 compliance and Audit review activities.* [$ s4 [; r3 X, n- F5 o2 v+ \9 i
0 W' p/ D1 m- C; v5 ^7 K" b& y0 A2 O% f! H3 N/ z2 l. z
Education / Experience
. I) ~' D; X- Y! U) z3 o# K• University degree in the field of computer science or other appropriate discipline; . ?- c: n- N5 D) B' g2 Y$ c4 L! r5 @+ h
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; - h4 X, v# Q8 X
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 J* l6 D' s8 r, H9 P• Excellent verbal & written business and technical communication skills;
% h6 ]# c' _& D% X5 ~5 o3 f5 @• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
7 o( t! S/ v N# l5 X' H8 f+ |9 g" U8 h9 U+ r0 B' ~' U
The following experience would be considered a strong asset: ! d8 r/ y3 O0 `9 u* l7 S
• Multi-tier computing architectures and middleware technologies; 5 e8 o. o+ E3 f6 B, {
• Web-based and 3rd party access authentication mechanisms;
: i# [; _" D* j5 e$ q% `• Demonstrated technical and security solution leadership;
; U2 F' C, Z" I4 }" ^% U$ X3 G0 ]4 k* V+ i
Education Accreditation, Certificates and Licenses:
4 q: z. ^1 n( G4 \• Possess or be working towards a CISM, CISSP or CCSP certification. |
|