 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting : x% f9 b# c! a0 e2 p( [" H
Job Title: IT - Security Architect
' ]: _! q5 g# A; z4 y7 PPosted Date: 10/22/2009 3 v& L/ {& D0 A j! k
Department: IT-Admin
* V6 H) x0 |* i* K! r n: e) OClosing Date: 11/05/2009
' y# \: a5 w% l) _# C3 Z0 A" `Location: Calgary
q& S- i! y! V8 KFull/Part Time: Full-Time
( M( N2 O( |9 U1 YRegular/Temporary: Regular / `1 N0 S" \7 a! x# [" {9 I
4 k' w- F. h& a2 H7 F6 Z
Job Duties / Responsibilities! j' q6 W6 _! n {& i7 v
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; / t" M7 _. s! G7 [& L
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
5 \/ F/ k9 K8 J) H• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
. y1 q% o. U( H4 [• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : N( I: f6 q# _1 d9 P& \
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; R/ k0 Y- `* L1 [* L
• Share best practice opportunities and provide an industry experience perspective;
; i2 I8 D' b' k. R1 P• Support and participate in SOX 404 compliance and Audit review activities.. p5 _4 s% x5 [1 _, H
! l N+ P: t7 I( w+ ?
7 K+ Z' m2 k, I o" _6 XEducation / Experience" K$ F) r, O$ ^; Y7 {
• University degree in the field of computer science or other appropriate discipline; % Q( }5 b V! h; x
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, k& p% ~* k+ [& `• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
% U7 \! `# y4 U6 c* E• Excellent verbal & written business and technical communication skills;
4 H: L. l5 U( Y/ v1 l* K• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
1 W% _. e9 S4 W: B. Q
+ t& g5 l4 l8 R; T: iThe following experience would be considered a strong asset: ! t' @7 O+ I9 k- ?! K5 h
• Multi-tier computing architectures and middleware technologies;
& Y8 U, L, B+ K. e• Web-based and 3rd party access authentication mechanisms;
) Q0 q& w, M4 t4 K3 y4 T# D) |• Demonstrated technical and security solution leadership; 8 ]4 z$ u2 J" o+ h3 u: d
1 s5 S9 L+ e8 |Education Accreditation, Certificates and Licenses: , k& h: l1 k' p- B# ]) m1 ~1 b% l
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|