 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
- Y) A8 a+ z1 H) g4 m+ sJob Title: IT - Security Architect
9 ?; m* W/ m) l+ {6 A6 EPosted Date: 10/22/2009 r# A$ p s9 ~, p/ |
Department: IT-Admin 5 \$ E3 X I! h2 k, y: C
Closing Date: 11/05/2009 : U+ m0 C- l; ] l* v
Location: Calgary
: w! M2 `% O3 }' o4 ^$ Q) IFull/Part Time: Full-Time ) E4 ?2 w9 E6 o( x% M
Regular/Temporary: Regular
0 s$ r0 p) U, p l* W9 J h9 f! w/ S, W# K8 L/ s8 w( j+ ^
Job Duties / Responsibilities4 t0 U5 p- E) c+ E4 p% d* J; m( S
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; / G" h3 A4 F5 ^& S, C& g- D
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 7 g3 S _3 a, J! h$ T
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; " s# L: m1 `9 W2 i, l" J
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 6 G/ ~/ E# V/ e1 B& k: a1 g# u5 m
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
7 m) i9 D3 ]/ b1 {& z' q f" p3 T6 N• Share best practice opportunities and provide an industry experience perspective; 6 m( ^8 B/ ?9 |. F: d2 y* g
• Support and participate in SOX 404 compliance and Audit review activities., D' y* X1 I# z- \& F# h0 l! F
$ J' i* j# ^: z5 v) U1 \
4 a! c% j1 [8 f$ i7 q2 _; p: LEducation / Experience
0 Z+ C1 `5 r3 I" K& {) k• University degree in the field of computer science or other appropriate discipline; 7 ]# b* T. c% {! d5 o# v+ m
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
$ e0 [4 r8 Z# ?8 |$ x T7 i& |% M• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 K4 a% T) i! m( o
• Excellent verbal & written business and technical communication skills; . r9 f" s/ |) R
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
2 |: O1 i; B: q7 T V5 e' G. D8 w6 h9 r7 Q' T! M, V
The following experience would be considered a strong asset:
) d0 b3 ?/ Y0 o( C' i* f: }/ A• Multi-tier computing architectures and middleware technologies; 1 F2 g$ \: @' m0 c6 s6 Q5 K
• Web-based and 3rd party access authentication mechanisms; 3 s8 h' H# ?- s! W" K' y; a9 T
• Demonstrated technical and security solution leadership; 9 ]; E8 j1 B6 ~5 M' Z7 I2 E' O
) K9 c) k% f) |/ m8 u
Education Accreditation, Certificates and Licenses:
0 D2 j( O2 y4 {& C( `$ A• Possess or be working towards a CISM, CISSP or CCSP certification. |
|