 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
( Q- J9 s1 y/ W% @" t' Q+ ~Job Title: IT - Security Architect 9 H$ G* m, P; _7 c- o
Posted Date: 10/22/2009
8 v6 U8 G/ ?8 z# d# k- ?Department: IT-Admin
5 e( Z X$ q4 B* rClosing Date: 11/05/2009
. H% n) k: l8 O+ YLocation: Calgary : q$ m% d1 c0 B1 r, V
Full/Part Time: Full-Time 3 x* b( V. M6 l# u, h% _( T9 J
Regular/Temporary: Regular
0 M$ Z$ Q6 G( k: i! T7 h/ P0 K$ ?- K4 E3 t
Job Duties / Responsibilities0 ?1 k) c2 \- N& E. A" p+ U3 O
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
" a$ H+ Q' d& z2 a6 Z8 l• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
) C! `. O& R2 r• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
) [2 r b- Y+ f t2 Y& a9 ]• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
# s, z) n, b& z# Y6 `$ Y/ t. |' Z, B• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 4 m$ R/ H+ T7 t' I1 r1 S& F
• Share best practice opportunities and provide an industry experience perspective; + D. s. r' W$ c! V ]% Y1 d; y4 p" T
• Support and participate in SOX 404 compliance and Audit review activities.( y. \2 X1 i' Y: C g
* ]7 l6 @" V9 R& k6 x1 a
; Y% y' Q8 u6 x0 bEducation / Experience
5 P. H9 ?8 a0 B+ }: _• University degree in the field of computer science or other appropriate discipline;
4 I# [ Y" ?; H2 @& G; |1 R2 [• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
- J( R% S' @. c6 N. R' N8 T7 P0 f5 B/ Q• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 6 k% F2 b" J% F A8 }
• Excellent verbal & written business and technical communication skills; 9 I( ^: [9 p$ u' G2 U
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. + `6 |& j+ i* m3 z$ r2 V! k. R
, ?# D' Q* _; q+ o( n% j) F4 x7 @
The following experience would be considered a strong asset: 7 y. a! l! P6 U% {
• Multi-tier computing architectures and middleware technologies; - X! |" w* J% v) J% w
• Web-based and 3rd party access authentication mechanisms;
3 q# T9 u/ W+ |• Demonstrated technical and security solution leadership; * J) r f' H2 u4 F
+ t- v1 y; C+ K2 c/ V* U
Education Accreditation, Certificates and Licenses: ! L/ p( Z' d. W0 [% o* `
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|