 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
/ F# @# i4 v% I6 q) o! H( WJob Title: IT - Security Architect
& ~- E9 X' O7 i! k9 a* |5 HPosted Date: 10/22/2009 + H6 U' {/ o1 r& V x
Department: IT-Admin W. V7 Z, X7 J! f& c' _' R
Closing Date: 11/05/2009 ; K4 d ^# }1 X
Location: Calgary 3 Z+ o9 c" E7 K3 f* k5 X, ?; G- D B
Full/Part Time: Full-Time $ s! L. l% k" p; S/ a2 K2 \% P1 E' w
Regular/Temporary: Regular
/ R1 [, ]9 r- N% J6 L* J# i, D$ _ F* N
Job Duties / Responsibilities5 M0 G( Z# T$ X* g
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
; I1 \, g/ `4 D• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; # q# k! y- X2 f& k) {2 j$ D3 e
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
& w4 m/ Z' s: ]• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ! @) S3 }! Z: ~9 n7 s+ a
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 6 v; p1 B) t2 e3 c R1 ^7 t
• Share best practice opportunities and provide an industry experience perspective;
; h7 R# a4 @' u, O• Support and participate in SOX 404 compliance and Audit review activities.
' r" _( M+ y, e9 P1 Q$ Y2 }1 S4 x+ L6 V
+ }- b" E! j5 ZEducation / Experience
2 g4 ?. s1 |) K: |$ W• University degree in the field of computer science or other appropriate discipline;
7 E1 f/ c' n7 `/ F$ M* U• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
3 z ~! a; @ q8 N- J# k, W• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 2 {2 o- U/ J0 A. u! V9 Y
• Excellent verbal & written business and technical communication skills; , _8 f0 a0 _$ t% w$ o0 p$ m, i e4 v
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 5 U: G9 @" n& p& s' @
% Z& M: {- v- _: p0 h( x
The following experience would be considered a strong asset:
' J5 i. B8 `" z& Q. c• Multi-tier computing architectures and middleware technologies;
, b U# S; T3 e) S' v2 X• Web-based and 3rd party access authentication mechanisms;
* U3 P, s, d T3 s$ j" ], Z• Demonstrated technical and security solution leadership; 6 F( }/ V1 ^4 j: K/ F
+ L$ T; U; [' Q( }4 Z# U
Education Accreditation, Certificates and Licenses:
: K9 [ D |: B3 N• Possess or be working towards a CISM, CISSP or CCSP certification. |
|