 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 0 U8 ~; W4 _+ L$ ~
Job Title: IT - Security Architect
/ ?- A. F7 _# d4 U1 ]' _, ~Posted Date: 10/22/2009 2 E) @& e' h% y
Department: IT-Admin
x/ Y5 S9 m8 k0 V; S. Y. G) p: rClosing Date: 11/05/2009 1 ~. W2 N$ o2 \9 C, _7 t- C
Location: Calgary 9 W& k0 J: ~) b$ `; E
Full/Part Time: Full-Time 5 K+ i$ C: j& j* w$ E2 I
Regular/Temporary: Regular ; R1 P" p1 x p& `1 d
4 {6 `1 I* w& ?/ m$ M9 xJob Duties / Responsibilities
( s! U6 X& B7 R9 J2 j2 k2 }• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; " Y# |/ s) [7 {8 l+ r! F
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
4 {% @4 s- l3 |; ^ [• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
# n+ h. t7 u0 B6 E" f! o3 m. E• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ( Q6 a' X3 E/ F5 \+ \/ `
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
* D. X9 i8 d0 w. V! S/ B• Share best practice opportunities and provide an industry experience perspective; 1 n* ~$ L* g7 s
• Support and participate in SOX 404 compliance and Audit review activities.% e8 r% n2 ?* c! P+ ]
9 D+ c2 S) `8 X K; w$ x1 M$ U. W- I+ e
Education / Experience
2 J. y" b! O' S: a. h9 ]• University degree in the field of computer science or other appropriate discipline;
% d9 F' g8 y2 m• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
2 ^ h* Z" K* u9 D0 v: a! r0 R• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; - f! {; G6 a4 L) q, N1 e
• Excellent verbal & written business and technical communication skills;
6 k) [" z0 g: F3 t- d• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
& `* Y/ p! z) ?) u n* C: K/ q9 s
( G- O+ E+ d9 k, l' f3 N* f7 X3 HThe following experience would be considered a strong asset: 9 i. O! ^2 u% N; Z1 ` { J
• Multi-tier computing architectures and middleware technologies;
6 Y3 V% m; k" _( o; J7 c4 |• Web-based and 3rd party access authentication mechanisms;
, n" Z; C6 a3 X, j• Demonstrated technical and security solution leadership;
% a+ ?) l* v( ], w- A
" L! E( v. V G1 H* GEducation Accreditation, Certificates and Licenses:
. R5 ]! u2 S2 l& N. _* t• Possess or be working towards a CISM, CISSP or CCSP certification. |
|