 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ m) X+ @7 _, q
Job Title: IT - Security Architect
6 g7 }# H6 |$ I# D+ fPosted Date: 10/22/2009
. N4 o! P2 `1 K2 v. O6 w$ nDepartment: IT-Admin
4 V) j1 U; r8 @, N7 tClosing Date: 11/05/2009 / O( z! `% @+ F3 y
Location: Calgary
8 ?) ^* k" b. C/ s" f. R5 Z' R: iFull/Part Time: Full-Time 1 N) D! S& K' |
Regular/Temporary: Regular
' H+ y7 u; H' b5 H7 |, e' G0 h$ A
Job Duties / Responsibilities- }3 h% V; S6 a* U+ N
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
/ T* |7 `+ w* `; g• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 8 V, i, [6 n. F* U! E
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
1 w% F6 D) N3 |0 j0 v• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; # U$ j% h' w; J0 z) |) C8 e
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
3 \6 O/ z8 K1 t( _% p• Share best practice opportunities and provide an industry experience perspective;
! O- R/ l) a/ D: d/ v2 O• Support and participate in SOX 404 compliance and Audit review activities.
5 ~$ {6 B" E" l7 U! }4 E
, r( p, Q) L$ L; S- \ @& l5 L& ^: X
# D5 Z) Q$ N. REducation / Experience4 d5 C5 j/ w, v/ d
• University degree in the field of computer science or other appropriate discipline;
& b1 [1 G* n/ [, }2 D; ?8 L• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
' e1 o9 @# W5 v$ M1 P2 M3 ]• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
h* J1 \2 q3 b; O9 K# K8 b• Excellent verbal & written business and technical communication skills;
2 c5 U! G2 \! Z V1 M6 m• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
" Y% A: L1 n% ~# d) q9 a d: n' N
( D# `/ @6 ^9 T7 W( XThe following experience would be considered a strong asset: : k, \/ V. o. N1 m8 ^
• Multi-tier computing architectures and middleware technologies;
+ q9 r) N+ u' c# F1 H, c0 j) F: |, k• Web-based and 3rd party access authentication mechanisms; j+ E0 v4 |' K! n; U. ?# P2 O
• Demonstrated technical and security solution leadership; ( n3 W9 \6 x0 ~8 [
3 `- K2 O! w& L1 pEducation Accreditation, Certificates and Licenses:
0 Y& ^# J- _' e; ? |9 C8 z9 S' F$ \. `• Possess or be working towards a CISM, CISSP or CCSP certification. |
|