 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting % I0 |, ]& R2 i- i
Job Title: IT - Security Architect
( }1 o; M1 ^ F& B2 J" b xPosted Date: 10/22/2009
1 N/ Y* y5 n( d+ g. ]- I( tDepartment: IT-Admin
x: @! K; w3 C9 M1 T8 ~1 dClosing Date: 11/05/2009 1 k9 K! W S) j/ {. Z6 P
Location: Calgary 8 N+ K6 N, U' E& @# N* h6 U; f3 Y$ v
Full/Part Time: Full-Time
# S5 ~2 F$ M8 w$ L+ gRegular/Temporary: Regular ' t3 u- G3 a" |
9 H) k _- L0 K% v6 M6 b
Job Duties / Responsibilities
1 a) } d% n, D$ i7 y" s$ b• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 2 E; V' y g6 u1 M6 F
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
2 Z0 V2 ]# n9 A- N• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
! a3 ^" r7 m: P# b• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
$ t* Z2 v1 Z* }, {* e. F) g4 X• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 4 ]! }7 {/ S m& r+ \8 e6 b
• Share best practice opportunities and provide an industry experience perspective;
2 p( x; ^+ [$ F$ Z5 E9 m• Support and participate in SOX 404 compliance and Audit review activities.0 c& @3 ]- H- S& f! B+ Z/ S
- s. z9 \! t2 C0 p! Y4 m" j! a4 K: D! I! ^: K1 w
Education / Experience/ ]) b+ d) b& |& e& P3 ?7 s
• University degree in the field of computer science or other appropriate discipline;
' x. _& ~' |+ ]% m+ n. Z3 a) N) t• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ( ?$ ?& l+ U" e3 f" D
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; * w( Y* I" D9 }2 r4 t4 T7 i
• Excellent verbal & written business and technical communication skills;
, h+ `8 l, O9 z# ^3 T& \) P$ L• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
& V# z. y- V& j" W0 H/ E
( ^# m/ o6 F0 M/ k2 H" |% cThe following experience would be considered a strong asset:
& L3 i$ o1 k% ~4 I8 l• Multi-tier computing architectures and middleware technologies; % k& F$ ^; T6 j2 u
• Web-based and 3rd party access authentication mechanisms;
; Y6 z( c% n- p+ P# ~) w• Demonstrated technical and security solution leadership;
* r. L& E. L+ z
, l& a. l" R; d# k# N1 a6 i5 z) dEducation Accreditation, Certificates and Licenses: & `6 P% O$ V. _
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|