 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 4 B8 l4 n1 J: `/ t
Job Title: IT - Security Architect 9 r6 T0 P8 J* o7 P
Posted Date: 10/22/2009
1 j$ `& F) c# a7 o# l; \9 YDepartment: IT-Admin
' X. K/ i) M7 TClosing Date: 11/05/2009 ' j3 } v% q% k4 Q* q
Location: Calgary * [# z. O6 J0 ?) a( `5 L. D% O: i
Full/Part Time: Full-Time ; F8 R$ w+ a0 d& A
Regular/Temporary: Regular
: C9 j. M. x6 [7 d: E0 X
8 g# t/ C! b* ^7 n) YJob Duties / Responsibilities4 e$ K7 n, `3 P
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
; l! c8 H- `: u& [/ f) I• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
* C2 W; n5 c9 s/ u• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
) y9 Q$ q0 x9 n) A( X# Z: h• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ' }. ]( \" |; x: z/ a6 T2 Z
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
: u3 ?" d$ E1 m+ ^$ d4 @• Share best practice opportunities and provide an industry experience perspective;
* i i/ \$ @/ r6 N- B) ^• Support and participate in SOX 404 compliance and Audit review activities.$ k' z0 d8 t8 Z" b* d
Y7 C7 z2 j J& M$ f$ G8 e+ G. y/ ]2 M& O, k0 v
Education / Experience
2 X( c5 S( M1 c* b5 g2 Q0 Q% z• University degree in the field of computer science or other appropriate discipline; . Z8 z" H6 l# j
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ' K5 w* T$ O2 D* z' G
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
9 G2 @- \. T" d5 S5 u, g• Excellent verbal & written business and technical communication skills;
], k+ m3 q4 A1 [$ v" K• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
5 \7 M! f F: `; v8 y* f: ?5 V/ _$ x/ m( b4 x8 J: S
The following experience would be considered a strong asset:
( Q6 H6 a" N; @* N3 ^0 l• Multi-tier computing architectures and middleware technologies;
, j0 g) R1 F6 v1 x! X# |- U) n7 t6 i• Web-based and 3rd party access authentication mechanisms; * e, |7 V4 r8 [1 \1 e) X' x
• Demonstrated technical and security solution leadership;
+ j! t# o. j) g" q4 G. |* z" Q+ M
Education Accreditation, Certificates and Licenses:
. a2 u6 ~1 {. f$ z3 z• Possess or be working towards a CISM, CISSP or CCSP certification. |
|