 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting % v8 h2 R1 q# J$ s9 {
Job Title: IT - Security Architect
- B7 b# `0 p( o/ W/ D6 l! g- ZPosted Date: 10/22/2009 * Z1 L, f" Q y6 X# s
Department: IT-Admin ' v/ \+ v9 G( s8 `
Closing Date: 11/05/2009
; N, j( S3 k. j& {Location: Calgary 5 G1 _0 k7 ]# p
Full/Part Time: Full-Time
% V/ v2 H W/ ]) }# d, I% M2 QRegular/Temporary: Regular
4 @, y+ {0 F% e4 g
2 U% ]& a5 T% D5 JJob Duties / Responsibilities
, @6 T- }6 K# ^) B' I• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; $ {# w6 d. q4 p: a; U* b4 T, d6 E4 u
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; $ G( a5 Q- \% v. E- s+ A- D
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; ) n5 h6 ]* s9 d
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 7 }: p* J( v+ N2 s- L5 g* d+ T" M
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # N1 X6 @+ `0 C) ~, Y. X
• Share best practice opportunities and provide an industry experience perspective;
( `1 I' A* P! w9 ]• Support and participate in SOX 404 compliance and Audit review activities.2 V4 _* U- [! }4 p5 R0 i" r
r9 l* \' l @ M6 x8 F e6 _
6 { b) b, _+ |- q- UEducation / Experience2 w7 M9 i) q Z3 N' g, v; q
• University degree in the field of computer science or other appropriate discipline;
% i) {2 o) v9 p• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; " P8 q) f* {, V2 j
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
( r% M4 S; j) Y# G7 Y• Excellent verbal & written business and technical communication skills;
3 \5 W& o# i, U, a$ s; x• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. , e& W( K& q0 Z2 i) u/ o: z
; ~, H2 p5 {: @$ K# f
The following experience would be considered a strong asset: & B6 K9 u3 ]/ y2 y6 j
• Multi-tier computing architectures and middleware technologies;
+ K0 S3 Q/ Z5 R' j; S4 M/ T• Web-based and 3rd party access authentication mechanisms;
p% K9 u7 N; q6 z• Demonstrated technical and security solution leadership; ' p# B% L, _' i l2 D5 m9 {
1 s" _3 @8 P/ w ~8 pEducation Accreditation, Certificates and Licenses: / B/ X6 \ A% N" M: z
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|