 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
* O, U1 G' B4 Q: g: LJob Title: IT - Security Architect
) ~/ h4 r Z' {. B" S( U. kPosted Date: 10/22/2009
' ~; I1 }2 ~" Q& x+ R; T' JDepartment: IT-Admin
; n& D6 e8 ~* c4 _) aClosing Date: 11/05/2009
5 P) ~6 A5 t1 q! x% z4 L6 _4 `Location: Calgary 6 U( ^: u7 F& ?1 ?0 z3 u% J0 e+ }( L3 a
Full/Part Time: Full-Time
/ s* H$ D6 }' c2 n) pRegular/Temporary: Regular # h$ d( ^/ p8 X
4 r0 I% N X q0 Q$ n- LJob Duties / Responsibilities0 L' n C) e% v
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
3 e3 l, Q4 S8 ?, h3 _$ y• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; - a7 E) C$ \$ j# U
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; * ~# q- o% O8 a8 E
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
) X [; Q- t9 z8 n• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 5 `0 m1 N n+ R$ G
• Share best practice opportunities and provide an industry experience perspective; 9 ]+ t8 u3 V C4 S- a
• Support and participate in SOX 404 compliance and Audit review activities.
+ ^' t, a+ K, i6 n' D( d# A" s
7 N$ F3 \* D- L# B
) x! `% X: N5 h: b$ DEducation / Experience
/ L+ D0 w8 U9 X/ ]• University degree in the field of computer science or other appropriate discipline;
4 p2 g) p/ P! H' k• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; * F* G3 V- i- K/ o9 Z6 e
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
8 K* _1 V- }) \/ t. ^7 w• Excellent verbal & written business and technical communication skills;
( A5 h/ s8 w# [% f9 n• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
; x7 r+ F: ^# c. S4 Y& [6 ]# y( w- i! q* ?
The following experience would be considered a strong asset: 4 ^4 t, e- s1 B& x6 R1 Y
• Multi-tier computing architectures and middleware technologies;
* f8 n4 U# X, ^1 v# U• Web-based and 3rd party access authentication mechanisms;
- d7 H, B: [0 ~; A$ r; g• Demonstrated technical and security solution leadership;
" z4 l) N+ Y1 |% k& A3 f' B, c
& [ \: e4 d. q& s9 A M4 nEducation Accreditation, Certificates and Licenses:
; N) l6 u$ b; j" W8 @• Possess or be working towards a CISM, CISSP or CCSP certification. |
|