 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
8 d9 E2 P- V0 k. e; _/ N( fJob Title: IT - Security Architect ( B: E9 o6 m6 o6 z M8 w
Posted Date: 10/22/2009 & h3 l1 D8 J. F
Department: IT-Admin
1 K5 T0 l7 Y" |2 [) ~Closing Date: 11/05/2009 9 b2 X( m7 |# F w- j9 c
Location: Calgary
* |" _6 m) Z' \* tFull/Part Time: Full-Time ( _# I+ h3 o. u2 z# a% ?& f
Regular/Temporary: Regular X5 \4 G! v, m5 q8 M2 P+ o0 p
1 h! F; m2 L# A, V- h
Job Duties / Responsibilities6 k3 z% Z$ R( `$ E
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 D: p: M9 P5 ^ J2 r- ]2 f
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
' v- Y! C' s! L• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
0 S/ K, r8 ~+ i6 r• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
( i: h4 _- }2 Z5 H• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
2 `, n' F' u8 u# l f• Share best practice opportunities and provide an industry experience perspective;
. G2 L/ t. u8 _' ?1 Y u. {• Support and participate in SOX 404 compliance and Audit review activities.3 N" g0 I4 w/ h; j
5 H! t1 n7 y$ M! Q/ S
$ K8 A; ~3 l/ f& h# TEducation / Experience; d- _/ F( U) P5 r% f
• University degree in the field of computer science or other appropriate discipline;
! R& m, I9 ~% D$ S9 Y) W k8 u) p$ d$ w• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; + [: u9 p2 \. o% e( q0 S$ n
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; : t+ S; m- i; r8 `
• Excellent verbal & written business and technical communication skills;
0 P# A" l. a8 r" q1 ^8 k: B• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. + J I. r3 i( R" H0 A: ]! ], i
8 h4 a( [8 z1 F7 }- p4 S; F, M; [
The following experience would be considered a strong asset: + @# v* j; Z7 @+ p: C& {
• Multi-tier computing architectures and middleware technologies; 4 s0 f w2 N; {- x# e* B. Y7 o
• Web-based and 3rd party access authentication mechanisms; ) Q% t: W/ @' P: F/ {0 R: ]# |
• Demonstrated technical and security solution leadership;
. m# a4 f& p1 Y6 g9 y3 q' u. ~1 Z4 r7 l2 d
Education Accreditation, Certificates and Licenses:
- O7 t! e/ Z5 w- `/ A: T• Possess or be working towards a CISM, CISSP or CCSP certification. |
|