 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting % K" w. j* Z H. `1 a+ n7 p
Job Title: IT - Security Architect
6 N9 p: w) s0 e) e3 APosted Date: 10/22/2009 3 k2 R: A5 Z6 n# r8 ^
Department: IT-Admin
8 \; q7 R* F. o2 q# q9 _, O1 O) \! I% lClosing Date: 11/05/2009
1 V! M' j0 p# \$ o3 SLocation: Calgary % q9 p8 K/ Q P2 B6 s$ U
Full/Part Time: Full-Time
5 R3 k" H$ c/ ~6 c4 uRegular/Temporary: Regular
' m4 {" o4 S& Q, e5 c8 l
. X1 Q4 C8 A3 d2 I& YJob Duties / Responsibilities, C% P/ q- R% A7 D% H
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; % `3 }- j. K4 x; Y! W) f8 p9 S
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; % U) P% i- b: g
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ( |. a9 k2 P/ v+ B0 }( i
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ) i4 T5 {9 E8 a) [6 K
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
. J# J: I) }# O5 J" j5 t• Share best practice opportunities and provide an industry experience perspective; ; _ o2 F- C" V
• Support and participate in SOX 404 compliance and Audit review activities.
: _( b! V# H: J* q
, g3 H4 x2 I# A& {! y# L& |, V& S% F, I- o5 ~
Education / Experience
! h5 h% u7 V7 |7 h0 ~; G• University degree in the field of computer science or other appropriate discipline;
6 l- @+ n. U3 B3 @• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
* g% w! o, U5 Z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
. _, ~' _5 Q. Z6 W$ ~4 V• Excellent verbal & written business and technical communication skills; ; V7 I( n4 @: T$ J% u
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. + I; u* ~3 o4 o3 o t7 J7 s
7 i& E. \* S) F) K" H' YThe following experience would be considered a strong asset:
- O; I" n/ z) `$ T# h* s& f• Multi-tier computing architectures and middleware technologies;
' t% _- m7 @! M1 p6 T• Web-based and 3rd party access authentication mechanisms;
9 m6 E' m$ l) Z* C3 c2 t• Demonstrated technical and security solution leadership; 3 c* u9 ~# i* }+ n0 |3 G0 a
$ W W; [' p' L: K* x
Education Accreditation, Certificates and Licenses:
% T" |% N% [7 H: O- t• Possess or be working towards a CISM, CISSP or CCSP certification. |
|