 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 5 }: {! u: N& n* K
Job Title: IT - Security Architect 8 F+ y! X0 f* _
Posted Date: 10/22/2009 # C( b U3 D. k. e" _: w2 q
Department: IT-Admin 2 \* g) [8 ?. U; q
Closing Date: 11/05/2009 & L' K/ v! B! V
Location: Calgary
- L- w4 t. [, Z( x; ?Full/Part Time: Full-Time
* b8 ^- v8 L/ q1 r& m+ rRegular/Temporary: Regular / Y8 y1 i3 b" w% u9 A
; n6 t0 A" C E' U3 R* ?
Job Duties / Responsibilities6 o" R7 W# ~3 T
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; + P: E* U, I6 f/ K/ q, L( D
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 6 M, H+ b2 c- ?' z5 m
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ) `0 Y. w6 Z4 B, k" T7 X
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 6 t1 j6 I5 ^; z5 \0 f
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; : T5 ]% t V5 l# v& H5 F
• Share best practice opportunities and provide an industry experience perspective;
& s: Z! k, U, ]; U( D' d• Support and participate in SOX 404 compliance and Audit review activities.) Y; _; u/ ?0 B
& A) n8 V1 F/ i. ] A4 p5 m2 M7 `" L7 f! P0 T2 M9 |5 @# P
Education / Experience& ^8 y1 i# ~3 l! H
• University degree in the field of computer science or other appropriate discipline;
+ h7 }* P F+ \) P7 B* u• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
H" ^( X0 \! Y( F c/ u• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 6 a' k/ {! b, S8 `7 Q6 C- Q2 @* k
• Excellent verbal & written business and technical communication skills; - B" y* u* _4 {! h' L6 L4 n3 d! F
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ; O$ o( w+ ~, m* g) O
6 z/ D8 M/ X" w h! ~The following experience would be considered a strong asset: E2 q1 E; H; h( U
• Multi-tier computing architectures and middleware technologies;
- o! g$ \) s+ W3 Y8 ~& p) L• Web-based and 3rd party access authentication mechanisms; . { l/ Z; U1 d. y
• Demonstrated technical and security solution leadership; & C# y# j" t" w, r( @- {
5 w4 g* O# q; x% t$ Y7 M% p& z/ MEducation Accreditation, Certificates and Licenses: ! p }7 N5 b8 J" l. I
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|