 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 3 g* w U$ ^7 w$ K
Job Title: IT - Security Architect
. |9 F& E: m- |% Q0 l- iPosted Date: 10/22/2009 & F! p+ Z0 v9 _
Department: IT-Admin
4 H9 q. G! G ]$ N& n5 AClosing Date: 11/05/2009 : q4 f; W( P4 E( m3 B% Y
Location: Calgary 5 P, B9 L2 E: \! t
Full/Part Time: Full-Time
( K! Q7 W3 ?+ Y' V. @; T% \& vRegular/Temporary: Regular 7 E6 O0 S, ]6 B4 y2 s3 g
' i7 k# o% x* c; k* C" n7 x7 y) e6 i. w
Job Duties / Responsibilities/ k4 i' a1 d( y" s
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ; ^& u# I) k4 l$ M* ]
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
; F, ^& j v! u/ h. a! i• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; & s) }: _/ V! v3 Q
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; * L, |. G' I) X1 d
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; / I+ F6 f) G# }0 H. @/ ?
• Share best practice opportunities and provide an industry experience perspective; 9 W$ H( Y5 O+ q
• Support and participate in SOX 404 compliance and Audit review activities.3 K1 N" H( x9 F& @' P& j$ R( v
7 B5 W; X K3 N% B% \$ P
" F; M, @2 e7 v" w6 t' fEducation / Experience8 ^- S+ R' t& ^! K( g1 I H
• University degree in the field of computer science or other appropriate discipline;
9 {; C) `% {- C4 v9 v! h1 {) v• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
9 e% H/ L: ~$ X/ B5 h/ D& Y7 V• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; $ I& E r2 P! ^$ k% t1 W5 c6 }
• Excellent verbal & written business and technical communication skills; ( R7 X3 Z# l& R1 u9 `! j
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
1 h) Q$ g( S, O& M& C3 D8 }: H K8 V' Y) Q% |- l+ w
The following experience would be considered a strong asset:
5 m! ]$ ^7 u: W• Multi-tier computing architectures and middleware technologies; [2 Z" \& k4 X( h
• Web-based and 3rd party access authentication mechanisms; - ^2 Z# B5 k, c4 R+ Y+ w* m
• Demonstrated technical and security solution leadership;
. c% {( Y- p: `" E/ m$ D; A' s0 S& o: X
Education Accreditation, Certificates and Licenses:
( I9 W* ~) m( P0 l" s9 U6 A• Possess or be working towards a CISM, CISSP or CCSP certification. |
|