 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ i) f+ T& v* x
Job Title: IT - Security Architect % ^/ k( {3 x- X% |
Posted Date: 10/22/2009 1 h! R+ n! [: V8 l! w3 O% h
Department: IT-Admin 4 `+ X6 ^8 ~1 x, P
Closing Date: 11/05/2009
# F6 I9 K' ]( F$ v- lLocation: Calgary
- Z1 k" X4 ^3 K$ Y0 ~Full/Part Time: Full-Time 4 B6 ^3 Q8 u6 K: ~, p6 _7 f
Regular/Temporary: Regular
% K4 M2 h$ p/ x9 D8 Q" p/ Q
) d2 N" L0 M. `! x qJob Duties / Responsibilities9 [3 P! b9 B, k! s8 i: H" z& e4 D1 S
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
: a. i/ d J3 E0 D3 {( z• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; , Z y6 x8 x- e4 {8 _+ _6 Z
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; . K0 X3 A' ~* d
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; / P m- b" {+ f5 ~( w1 e z
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; . g5 m) Q+ a( E: v
• Share best practice opportunities and provide an industry experience perspective; d2 M$ t; i& G8 i
• Support and participate in SOX 404 compliance and Audit review activities.0 g+ c3 e F4 l# @; O: ]
8 d( a4 w8 N" A
8 j- ?. B: g) ]9 `9 n
Education / Experience
$ Q- e" q& B- `& V• University degree in the field of computer science or other appropriate discipline;
* ~ w2 F6 [+ u' I0 Y• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; % F! D7 e5 v2 }; M
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
$ q8 }3 s. F- @: z4 G• Excellent verbal & written business and technical communication skills; / O, y; G" Z/ i0 o9 i' w5 K
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
* B) C$ L8 W [. ~& E2 E. m5 O. D0 {( w4 m3 z
The following experience would be considered a strong asset:
$ X1 Y, f3 ?3 G& Z# J• Multi-tier computing architectures and middleware technologies; * n- V \5 i7 {
• Web-based and 3rd party access authentication mechanisms; 1 B8 w) T1 `' N$ I% j, P
• Demonstrated technical and security solution leadership; " N1 l$ n" z; Y% q, T- b, G, |
( G. ^$ l4 V* ~2 x, W+ U8 O8 CEducation Accreditation, Certificates and Licenses: " v3 }; g. O' e
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|