 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting $ [5 g0 f* b( w; W0 h
Job Title: IT - Security Architect
e! P' b- a! kPosted Date: 10/22/2009
. m. i5 N& a0 x' t& L' H+ kDepartment: IT-Admin
/ q/ M/ W0 g! m3 s6 ~+ Y$ V, _Closing Date: 11/05/2009 % j" Z8 a- H: `4 X0 j# v% L
Location: Calgary 7 c ]8 h9 l2 n* f7 X
Full/Part Time: Full-Time
4 m' J' t$ e6 ]" p6 L' RRegular/Temporary: Regular 2 l' I/ D& _+ S6 O0 ~& \/ Z& v
& \7 n" r. ~% }; ^. xJob Duties / Responsibilities; q( G) F, F6 c8 v" R, i
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; & _# K& n' V' j5 T9 D( b
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
( k% O: d! L% K7 s9 ]• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
& L6 Y ^1 O. v• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
/ C" C" c1 }% Y" Q# l7 C) z• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; : P9 r Z+ {8 `; j' T4 b: `
• Share best practice opportunities and provide an industry experience perspective;
$ [, Z& | U# C2 M3 w9 `• Support and participate in SOX 404 compliance and Audit review activities.) [0 U5 L3 l7 Y5 A) o
1 u# a! |1 b2 I: x- L0 E4 }4 D6 F; P' d8 B. | s( J
Education / Experience* @2 I: H z( F: z6 h% u6 o
• University degree in the field of computer science or other appropriate discipline;
; E' _0 r. Q+ p6 \• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ! `4 G3 H$ E# {; V; A' _
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; [2 ]6 P$ ?& X8 P3 s( R
• Excellent verbal & written business and technical communication skills;
6 `4 p3 t+ [' W" q• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, P: o' n! q2 z2 J
1 U" E% \0 } j. @) L& K5 r3 hThe following experience would be considered a strong asset:
; F/ K5 X, J! {• Multi-tier computing architectures and middleware technologies; + K. }9 B; e; s+ Q4 B
• Web-based and 3rd party access authentication mechanisms;
, H9 Y0 f# }6 x2 T! L8 i8 N• Demonstrated technical and security solution leadership; & ^5 C% k& J! ~, ~3 M. f
1 d7 D2 K5 h) s' `+ p# Q& E/ d
Education Accreditation, Certificates and Licenses: : i& s" O9 X) r
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|