 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting . ^" [4 K# O+ U: \) P/ O' }* T8 C
Job Title: IT - Security Architect
: s! h2 _1 V" m& h& HPosted Date: 10/22/2009 & X+ G1 R0 D% k3 k5 d" g; j
Department: IT-Admin
8 {1 F3 _8 T8 q1 k' bClosing Date: 11/05/2009 % L. p" t# o7 Y0 H8 W( D3 {2 F
Location: Calgary
/ Q( O+ l: T2 L; a. }- `# k1 sFull/Part Time: Full-Time
4 L- B% S/ q+ s; QRegular/Temporary: Regular
, g$ G( x0 \6 Z8 C! r- e, R' S- a: Q* a, ~
Job Duties / Responsibilities* b. k* e9 z( I! l2 v8 X3 r; H
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
1 f( p5 k" h& \. n9 ]• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; - L3 N& z/ W% V8 F
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
/ b& L4 A) s1 F• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
! v9 r* R- H* k0 l• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
' v0 q$ Y8 v/ a$ p• Share best practice opportunities and provide an industry experience perspective;
( \1 ]& z. B* x# r& W• Support and participate in SOX 404 compliance and Audit review activities.. P4 r0 N2 c8 Q7 D' o: L
4 t0 Y- q2 p' d9 j, [1 F1 f
H8 M- y6 a, R8 \3 o! Q, w( fEducation / Experience; _8 P% d( T4 w; V+ R6 A
• University degree in the field of computer science or other appropriate discipline; " f* [. @% ]' E. h* B/ H6 u& {
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; " i2 {' W" L+ M6 C& |: i9 b
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; $ X+ G; [1 M" F
• Excellent verbal & written business and technical communication skills; % K0 D7 ]$ M6 O) }: Q5 ~ R+ I; N
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
1 I" E3 d& G% M! G
2 I' s) r( X! t5 ~+ D# V' c4 UThe following experience would be considered a strong asset:
# z% K% T' z8 c! H• Multi-tier computing architectures and middleware technologies; 2 m9 M3 b7 O1 [1 F6 h& `; n
• Web-based and 3rd party access authentication mechanisms; , B* n2 P9 X5 R& X- ]6 x* x; N" U# ]
• Demonstrated technical and security solution leadership;
9 Z9 K2 e$ k4 ^8 `" Z# l
; Y5 j+ S. X3 S) ^" NEducation Accreditation, Certificates and Licenses: 0 {( B) O" Z) `' A, U+ B0 A) ^
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|