 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting * K" R" J# o6 Q0 q, B' g
Job Title: IT - Security Architect ) q$ k. t6 x7 S0 o- l$ q
Posted Date: 10/22/2009
( J; T0 i; B& s9 eDepartment: IT-Admin
4 t0 b j8 A1 B3 r1 a. O! KClosing Date: 11/05/2009 ' K3 G7 R% j" q" s- X
Location: Calgary - O- f4 s% U( r. g5 V
Full/Part Time: Full-Time
/ v9 I: m% V! [, P4 oRegular/Temporary: Regular 0 U* X( d* i4 m# A" U" M/ A" q
0 A8 i( u! R- h; O H7 n0 W% Y
Job Duties / Responsibilities% x# @, y) a" F6 l Z( N+ j
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; " D0 h0 j, `; T' {/ z/ T Z
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; : [* |2 I8 j$ Q
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; & k7 s T2 m0 F; P6 S
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
( s5 N! Z g4 _1 @% H• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 5 t, I6 |7 I" ~: w* w2 u! r8 c: d
• Share best practice opportunities and provide an industry experience perspective;
5 ]+ l5 |. z# @• Support and participate in SOX 404 compliance and Audit review activities.
9 x+ E8 j- d3 r, h; O4 l- g6 E1 g& E( K3 d" S4 p# s
/ E; _$ [3 E& qEducation / Experience* M: }) U+ b( z' F2 \
• University degree in the field of computer science or other appropriate discipline; * }8 M2 f4 i+ k+ W
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
. E7 Q( j* Q. s• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; : z0 G) s5 O. Y9 i
• Excellent verbal & written business and technical communication skills; - F: T8 _+ R2 o" R3 y. X
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
" c. v$ h9 d' _0 n5 l0 W/ [
* l, D( E5 |6 n2 c2 U# O( ^+ WThe following experience would be considered a strong asset:
2 ?. T ~, |$ C$ f! Z8 |. W6 c• Multi-tier computing architectures and middleware technologies;
8 ~% y$ h+ M ?' F5 m+ i) S• Web-based and 3rd party access authentication mechanisms;
3 X* i* Z& s( ^( v• Demonstrated technical and security solution leadership;
. @' J' p/ Z4 H. p
0 G [0 N% {- j9 {! X4 p M6 bEducation Accreditation, Certificates and Licenses: l3 K( s) n' S! c3 r1 x2 V
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|