 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
% R' e# p+ Z+ U, W' |0 t' yJob Title: IT - Security Architect ( @/ s6 t, |' P1 s* x$ T+ }" s4 G4 F
Posted Date: 10/22/2009 & C4 X$ g2 t! r2 m% d, o9 R
Department: IT-Admin
/ w2 |* C+ z& n) S+ ]2 n% PClosing Date: 11/05/2009
) I9 `* x- U: F; L( c6 OLocation: Calgary / f; l3 }! U3 U* U$ p
Full/Part Time: Full-Time 9 |' o3 w8 c* n$ u3 C
Regular/Temporary: Regular
0 C8 x! k( X/ ~ e/ ?- o; V- O! S* x: `; _0 s5 e9 a
Job Duties / Responsibilities
/ d2 {3 |; @: A5 |* P, k• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 4 o$ q F# T$ Q" a
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
$ r: p8 m4 X# s, i+ O1 S• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
* s5 o/ Q! B9 l3 k& x3 |/ ?• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
7 F3 M; d! e1 N& M3 `• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ' b1 u+ a7 _0 e
• Share best practice opportunities and provide an industry experience perspective;
. l6 Q1 h7 I5 H( P; L F* w* k: t• Support and participate in SOX 404 compliance and Audit review activities.
% H; C" g. }5 ^0 @( k( d4 a, Z7 h. w; _1 N+ n4 J: }
/ R& `0 O {) s7 @' @Education / Experience
$ w! a) W- s, s! e• University degree in the field of computer science or other appropriate discipline;
+ w1 K, B' S1 X• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
+ }& F1 s6 K2 G3 u4 F0 u• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ! o$ e9 ?6 Y) g
• Excellent verbal & written business and technical communication skills;
0 }) e# q+ r# j1 |& `' i- F• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 0 M/ m s, H" t. n8 M
, I; n1 Q# @( T! m+ n' K
The following experience would be considered a strong asset:
% r2 `0 w5 u, S7 d% z7 H- g6 c• Multi-tier computing architectures and middleware technologies;
& p0 o& d6 K( P" k9 w• Web-based and 3rd party access authentication mechanisms; P1 g$ E( `& t* R6 S! D
• Demonstrated technical and security solution leadership; 4 q! r: i& v" {$ i
( k, P8 }6 ~1 d* |3 x5 `3 pEducation Accreditation, Certificates and Licenses: ' ^4 S$ P$ s+ B
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|