 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 6 J! J; P9 Z/ o; H U* c* d
Job Title: IT - Security Architect
- }/ s* Z1 Z! Q1 @' O3 jPosted Date: 10/22/2009
0 n l- N+ g0 u- I- Q& M- r. ^Department: IT-Admin
7 c2 P" V6 n$ ^+ X8 m8 O9 ^Closing Date: 11/05/2009 - V Q. L; l/ c/ X8 m
Location: Calgary * S1 E+ X9 Z# q: m: F
Full/Part Time: Full-Time
b+ \/ z/ ]4 e4 B3 iRegular/Temporary: Regular . R' J0 D" s, R1 }' B- o
) {0 ?: _, h+ [8 a: x0 X8 H6 c
Job Duties / Responsibilities
) U: q. i& R4 ?* E• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; : G7 w# v3 s- N& h- O& G9 `# S
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
' ]% E/ r0 A6 ~( d/ P8 c• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
/ d/ ?8 m) C! E4 F2 L• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; % f# x, B5 ?5 x9 Q U7 p
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
+ L" K. ?# q; n" e& F8 U; d3 N) m• Share best practice opportunities and provide an industry experience perspective; + r. {3 e$ r" }3 y
• Support and participate in SOX 404 compliance and Audit review activities.
8 R+ O+ P' I4 s! ?
, r+ w; M$ {. g" }1 Z. J" W
; O" q3 G+ v) |7 w7 I7 q8 f: G' UEducation / Experience4 w8 C& z, T/ {" h& j
• University degree in the field of computer science or other appropriate discipline; 0 [- n! z6 [1 h& i8 D" C
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
# D9 ^' |: g, ~7 J; e• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
* Y5 Q% _2 U5 S" t6 W5 g1 W9 p• Excellent verbal & written business and technical communication skills;
3 J2 w2 |. A9 G• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 8 `2 T$ n! f( E* B
" u" @# ~2 x, x
The following experience would be considered a strong asset: ' u, F2 s: T. w, W( ~; H4 A
• Multi-tier computing architectures and middleware technologies; 1 O+ p7 S" S; t) `1 q' D
• Web-based and 3rd party access authentication mechanisms;
- C, u9 c% x) O+ m• Demonstrated technical and security solution leadership;
$ N. G' B8 B/ Y- v3 q4 v+ }: J
$ I& M2 Z4 p1 I/ S/ N2 V, [Education Accreditation, Certificates and Licenses:
8 V$ t" Z1 G; i• Possess or be working towards a CISM, CISSP or CCSP certification. |
|