 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
) {& L* A ]/ ?1 D* }. ?# C6 QJob Title: IT - Security Architect * n3 O' ~! j* {
Posted Date: 10/22/2009 2 a+ Y E! Z4 d; a
Department: IT-Admin i. S/ v: x" b4 W
Closing Date: 11/05/2009
) Y5 R! I" d) ^& z. aLocation: Calgary
- q& e" j' Y* J( d: P9 c+ }Full/Part Time: Full-Time : R& A# ^* m6 }; v8 C
Regular/Temporary: Regular
0 M1 F6 ^, ]/ _. R" J1 D
+ E4 R1 U7 h, c" }+ N; b2 AJob Duties / Responsibilities
0 S, p: j Q/ c1 ^8 j" W# X• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
# g6 s) q6 O8 Y3 u* I; c, v• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
( r5 y! l& O! f• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
, ]0 E4 e! e( [5 d9 T: W, c• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
4 h5 P: F/ p f; X3 T' `3 I• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
* c( ~* n, |' o( }• Share best practice opportunities and provide an industry experience perspective;
# v4 j5 R3 D4 t( q( K• Support and participate in SOX 404 compliance and Audit review activities.
0 S- z0 R9 E3 V7 K& Y
9 X' C6 s4 l/ m3 V+ s8 F; m0 g$ c1 g/ \
Education / Experience) \( f% j* P- z
• University degree in the field of computer science or other appropriate discipline; . C& |( |8 O7 U J
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ) r6 n, X% g# S S( _
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
+ l# Q R' A" T8 |, A• Excellent verbal & written business and technical communication skills; ' k. |" n* ^+ t5 q' w3 C
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ) w2 L: T$ ~( s8 o% _/ p" H" J7 w
/ o6 J' P, Z! T4 {7 w, C
The following experience would be considered a strong asset: 8 s6 s4 S7 O N& h) i% |
• Multi-tier computing architectures and middleware technologies;
, g7 j- S0 U& v• Web-based and 3rd party access authentication mechanisms;
: O+ L' o$ l) ~: A0 ?• Demonstrated technical and security solution leadership;
0 Q; ]3 O2 {0 N' L2 B
( \- j1 r p5 x: c2 ?, [: @! _Education Accreditation, Certificates and Licenses: , z9 \% ^4 i9 g& \7 d. W
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|