 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
1 d$ E& S* ]: S# q i2 [! L! _) xJob Title: IT - Security Architect
; \5 ]: g# l: ^3 Q# A2 V7 m2 WPosted Date: 10/22/2009 9 K1 Y6 k* }- }# [4 }
Department: IT-Admin
- L6 b; _: H8 \9 b( pClosing Date: 11/05/2009
& [( D+ E/ X; A- TLocation: Calgary 6 j- j9 S9 p3 z
Full/Part Time: Full-Time `+ c9 C( w: e7 d( q! c9 F
Regular/Temporary: Regular
W2 S9 O. k) v' J
4 {& [2 n, r7 }$ }+ l: L( }3 D0 O$ KJob Duties / Responsibilities
# W$ A5 v# W& g; Q5 I4 z p1 @• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
6 O8 B+ E8 }2 W% F2 m• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
9 Y; E9 D/ X& K. d# {4 ^9 {• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
& W/ ]3 ~1 q+ p8 G• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ( ?! x* N8 w' x
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; : J0 f+ @+ Z6 H4 K. X
• Share best practice opportunities and provide an industry experience perspective; - x, H: P- N4 ]. ^! W$ }
• Support and participate in SOX 404 compliance and Audit review activities.
6 n8 A0 Q' F' H+ }0 b& k
+ a2 c" y w; u/ m# p& u9 h6 b+ l, h2 a5 j* n$ t; K) `
Education / Experience
! o) {+ o1 _. t8 m• University degree in the field of computer science or other appropriate discipline; , d4 W+ G2 O0 B" w$ J8 U+ I
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ( y( G( |0 ^% E4 c4 \
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 9 r5 b$ Z6 B7 K* J D! M
• Excellent verbal & written business and technical communication skills;
; J3 B; s* S, o5 w• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. $ T) c% C+ y4 F* r9 X
2 X( M7 z% J4 P% Y5 n- y
The following experience would be considered a strong asset:
( K7 o l# j/ n, c2 U4 |• Multi-tier computing architectures and middleware technologies;
9 I( `- `* X* F8 q4 X• Web-based and 3rd party access authentication mechanisms; 2 _8 W- y" @; n1 X) v
• Demonstrated technical and security solution leadership;
+ M* b1 {- z- h5 U+ ]# h* w& E7 D# N) u" |% a$ ^
Education Accreditation, Certificates and Licenses: 5 w8 l5 g7 n2 I6 |- v0 A
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|