 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 0 c0 k+ X7 K8 B/ P( d6 k
Job Title: IT - Security Architect
% D& k! A! m5 t; uPosted Date: 10/22/2009 6 K! O6 N% B. q
Department: IT-Admin * b8 K4 P3 t. x$ l' t5 z" ?) @! e( q
Closing Date: 11/05/2009
6 i5 F, v. G0 b' T* DLocation: Calgary 5 u, i l2 [& z! A0 K/ T. q
Full/Part Time: Full-Time
9 [, X1 X& f/ T5 cRegular/Temporary: Regular
' E/ a9 M- c/ V. m8 U7 [+ H; {9 P
Job Duties / Responsibilities
3 V6 F2 H2 F% q ]8 q• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 3 ] [9 {! v# G# |/ B
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; & E3 J" K# u) E
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ) `; }# H; @1 L( U2 C- x3 [
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
( L* g; Z3 l& r/ K1 K• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
& O. {* i1 g0 E• Share best practice opportunities and provide an industry experience perspective;
$ T$ [- k# A' B$ ], I% h• Support and participate in SOX 404 compliance and Audit review activities.
5 {! i0 k, e! I1 n
& V. p# r/ X7 m2 b4 b; Q3 _* T7 d$ H- t" S
Education / Experience
6 y4 N N" l9 o$ ]8 ]# C• University degree in the field of computer science or other appropriate discipline;
: O2 ?$ j, z- D• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
3 L" s0 L- ~" I% F( K* U8 \• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
2 R5 G' v5 J' j* h1 i• Excellent verbal & written business and technical communication skills; , ]7 V6 K1 V6 }
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
9 t) g, r5 W6 T6 U
5 _. w8 {( ^+ F& d3 H& ]The following experience would be considered a strong asset:
@3 T# [' L. D* G• Multi-tier computing architectures and middleware technologies; " T$ V `9 X2 H d1 A, n- P
• Web-based and 3rd party access authentication mechanisms; ) H. T8 U! W$ D0 i
• Demonstrated technical and security solution leadership; 5 @" i( i S/ {' V
, a) e% C3 e, m! j+ J4 @Education Accreditation, Certificates and Licenses:
6 Y- A: r0 t7 c1 p2 R• Possess or be working towards a CISM, CISSP or CCSP certification. |
|