 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 3 y9 g- w+ z$ p+ h1 m+ f
Job Title: IT - Security Architect
4 D7 _) z4 W0 [) RPosted Date: 10/22/2009 ! A# {& ^ w+ J9 {
Department: IT-Admin 5 ^% ]4 e4 k4 q9 u
Closing Date: 11/05/2009 5 d% o4 M6 K* X7 ?
Location: Calgary
3 D8 k3 U" ]1 f1 E; | u* SFull/Part Time: Full-Time
. b$ F9 x& O5 F: E. O( l( |Regular/Temporary: Regular 1 ^' k+ b+ B% {2 n" T) g3 S
( y0 P. f5 x4 e8 E1 e! J2 m1 ZJob Duties / Responsibilities6 I! l( g2 s, T% } G6 Q* \
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
, g) D V) `6 O, A9 v• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; / j# E; r: J A# U; c. J z. d
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
6 m$ m1 j) `( y9 {; b# D) o• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 7 a/ \8 m1 s3 b3 T8 y$ M
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
& Y* ?7 _" A6 f& @+ L1 k• Share best practice opportunities and provide an industry experience perspective; ! t; c* V2 E4 L- k8 f+ t) w
• Support and participate in SOX 404 compliance and Audit review activities.3 n4 R5 @9 r3 N' ]0 j+ x9 G
7 Y" ^, @9 o- A; W. O5 o4 V
7 A* d* d! |" n0 E! ?Education / Experience* ~3 e8 J K+ P6 ]1 b
• University degree in the field of computer science or other appropriate discipline; ( d- ]( y) v: o. h
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 6 t; y- J N) {- U; \) x
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ' f0 t) A/ _7 ^' ^$ X
• Excellent verbal & written business and technical communication skills; 0 _3 G6 ~3 ?3 g% _9 c
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
% C9 ` B2 I& y6 P. H
# |- w! a- A9 mThe following experience would be considered a strong asset: ( m- p4 D5 X2 h7 b R' q
• Multi-tier computing architectures and middleware technologies; ( S* k% P% }# W, C
• Web-based and 3rd party access authentication mechanisms;
/ f% n( Z' }8 [+ Q, J) o8 y• Demonstrated technical and security solution leadership;
+ [3 H0 t, J4 d5 ]: F: ?$ ?2 E' z
Education Accreditation, Certificates and Licenses: / h1 |% w8 ^/ d' n' g- N7 x
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|