 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ~" Y( B7 e9 E8 b* X! m
Job Title: IT - Security Architect
- y9 X; L; t$ hPosted Date: 10/22/2009 & y- ]* J6 D9 @) j
Department: IT-Admin
4 n I7 Y/ |7 \6 H7 b* eClosing Date: 11/05/2009
4 e+ r" r |4 P0 i4 c* hLocation: Calgary
% j. p. M l$ X" ]* t& G7 H6 {Full/Part Time: Full-Time
7 q% B$ P6 ?+ E" ^7 dRegular/Temporary: Regular . }$ M/ k/ a+ M2 h2 h" z& R
5 n r5 a' c6 F; K, e5 x
Job Duties / Responsibilities
$ O5 w( p6 t" l3 v• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
1 J4 [; ~, h/ J2 j• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 8 G" T8 Q# H. ^3 d# f
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
: F5 x' o, v, _" R$ ^• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
) F/ S4 x5 F$ [. K) a3 P2 L• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 7 t$ ~2 Y" W* z2 f7 F
• Share best practice opportunities and provide an industry experience perspective;
/ |+ E5 w9 w, g5 r" e2 ]0 { Z3 N• Support and participate in SOX 404 compliance and Audit review activities.! z& D& J- h# c5 O# q
! {) Q- F+ E4 n$ u+ c5 P& ~- u7 X4 t3 a. ]4 A/ M# M, V! e
Education / Experience
9 C- q3 Y2 f0 C' v8 O3 @# C& [) s7 i• University degree in the field of computer science or other appropriate discipline;
) [+ C! f: C1 o- o7 Z• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ' ~$ [" m6 h5 s2 z
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
9 x. B! m( b: o$ O- I1 K• Excellent verbal & written business and technical communication skills; ' f) F5 H Y H. Q5 n1 f
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
6 @% |( F$ L. J% {" b/ v5 S; X# u4 @8 }" ~2 d8 {3 J. D8 a
The following experience would be considered a strong asset: ; P, ]- Y' l) q
• Multi-tier computing architectures and middleware technologies;
6 V3 W }; z# r$ _" ?# c• Web-based and 3rd party access authentication mechanisms;
; L& H* d- w, Q; D5 ^9 N• Demonstrated technical and security solution leadership; ) H U3 U7 _) W9 T5 e
& Q( S' t. [. B, JEducation Accreditation, Certificates and Licenses: 4 {+ J9 `* }1 V8 S: k$ V. w
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|