 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting & D: B: o* I' ]2 u$ q4 f
Job Title: IT - Security Architect 7 Y, F) l l) `! [& {+ }6 J
Posted Date: 10/22/2009
. _8 E/ V' O0 g1 W) X6 ~, fDepartment: IT-Admin
% ^ P! ]$ _' G+ cClosing Date: 11/05/2009
" Y- p. }2 B) Z g2 c6 q: VLocation: Calgary
, d6 V9 |8 M7 YFull/Part Time: Full-Time
( \8 i: z% k% D& RRegular/Temporary: Regular 4 P% I9 b% |" a' N& I/ b
* K* S& U- a6 Z7 Y" eJob Duties / Responsibilities
7 b4 H9 v, }2 t' f0 {# `+ }• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
! I/ j2 d. r6 d7 K8 O: l• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
8 C4 [+ i/ }0 S2 H4 K• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
& E0 Z) x1 ?! f+ L" ^• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 g$ h: Y: n& Q9 p7 z• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; ; N* v6 D1 `$ @
• Share best practice opportunities and provide an industry experience perspective; 6 u/ X/ Z, W2 P2 y
• Support and participate in SOX 404 compliance and Audit review activities.. C$ N! ^) t. M f
+ {$ ~+ H/ B; k, L4 C i# q
& K" ~5 a& \9 a! T9 a0 p" hEducation / Experience' d3 t L+ @# t+ k
• University degree in the field of computer science or other appropriate discipline; 8 [3 C9 f/ u2 L, J, Z2 k! e% k8 W
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
& O/ t, j1 ]5 k( _7 M6 w• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ) d: D: Z" c9 ^5 {+ j
• Excellent verbal & written business and technical communication skills; U* z0 p$ y, x" F% ?* K- t7 g/ K
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. & z$ t' v( Y j' f- d7 S5 f
0 u! g/ ], O: \5 d6 l
The following experience would be considered a strong asset:
, s. M! S7 G, i/ t" _, B' t+ S: L• Multi-tier computing architectures and middleware technologies;
' T7 R7 T3 D& l/ X/ [0 D+ F• Web-based and 3rd party access authentication mechanisms; 2 X3 s8 M0 E1 F" h3 ~; c, e
• Demonstrated technical and security solution leadership; ; v+ D/ k% ~+ b* Z* \
7 q" n9 g8 L' W7 @+ I# u+ ^
Education Accreditation, Certificates and Licenses:
8 `0 g, R8 d( K j* T$ k• Possess or be working towards a CISM, CISSP or CCSP certification. |
|