 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting 0 a! b- W* U5 d: h: P8 A
Job Title: IT - Security Architect
4 X" I" G& h3 zPosted Date: 10/22/2009
$ o+ {; [- \6 XDepartment: IT-Admin
k; Y, S* y$ PClosing Date: 11/05/2009 [" N0 ^ z# Q
Location: Calgary + [" j$ A8 q5 l* ?) }) ], A
Full/Part Time: Full-Time
9 X# @* m7 q9 ]2 i k: z6 E% yRegular/Temporary: Regular
- h6 v, [& h5 t- Y q# t% R) n; j/ F5 p+ d( F( h
Job Duties / Responsibilities
+ z+ F0 w) H x8 D1 V3 b" a• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ) t! w* p4 [' ?, j0 n7 c3 n, U
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; & [2 V; C3 v' _
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
, Y9 J+ u# q% f4 [5 S8 ]$ `• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 1 _/ _2 H! ]) C5 `
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; - e" i6 f4 U; n, K
• Share best practice opportunities and provide an industry experience perspective; / ~8 I6 z; c" M* q7 T( @5 K( b- a
• Support and participate in SOX 404 compliance and Audit review activities.% Z1 L& F3 _0 ^
& A2 p: u3 h* l- l# S8 n8 R" _8 u$ h; x% k3 W
Education / Experience" G% F1 l# Y( g P% R
• University degree in the field of computer science or other appropriate discipline;
1 D: L0 A1 o3 r+ r• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 7 P% p8 `5 @' r/ B
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 0 w9 v+ s& n$ h( k. U
• Excellent verbal & written business and technical communication skills;
$ S! L5 [; `% U! H+ `7 K, k, S• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
) O# P: ]. e+ U4 o8 o* B( L' q" P, g) g' w
The following experience would be considered a strong asset:
5 D, o* x& F6 j* A7 z0 C5 ]• Multi-tier computing architectures and middleware technologies; - a3 S; \! T. A% J: f o
• Web-based and 3rd party access authentication mechanisms; 9 c6 ~, e3 H; B! y) u
• Demonstrated technical and security solution leadership;
, |9 p$ l& k) y
1 y& t+ M* Y# W$ gEducation Accreditation, Certificates and Licenses:
. N( f" f- E) x( |7 E• Possess or be working towards a CISM, CISSP or CCSP certification. |
|