 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting ) c b: u1 [3 |4 o, Q
Job Title: IT - Security Architect
7 x5 `! \" m, ?Posted Date: 10/22/2009 " n1 ?, g: R* D% D
Department: IT-Admin
% {! f# {7 [) d, F0 U7 }- AClosing Date: 11/05/2009
4 Z1 X0 |& o, }: n5 i% dLocation: Calgary 2 n, K, x$ c" r4 Z
Full/Part Time: Full-Time $ u8 l9 [! t$ Y/ z
Regular/Temporary: Regular ' X8 s% b0 D+ i! D. O' b5 J' i
! H7 _5 s" v7 X& I8 FJob Duties / Responsibilities
, i3 q4 Z7 D$ Q5 b! ]• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
' [ h3 ?* Z# f8 i; \8 ]9 c• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
. `) \$ ]- H* r# x• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; * w; _( }+ d7 `& \4 k/ E
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
: z: h' @0 D0 k. J• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
6 z. ^$ f' M6 Q3 s, ]• Share best practice opportunities and provide an industry experience perspective; 0 \. d; @& ?8 R6 |) S
• Support and participate in SOX 404 compliance and Audit review activities.7 m+ V# p( K) {' v% Y0 a, Z
; S; D5 L" Z8 g3 U& d# q" c% s
/ a7 Z' p8 R& }, k0 e% n9 m; g! ?
Education / Experience
: d. M. {/ Q: y P• University degree in the field of computer science or other appropriate discipline;
1 L" G7 l: t$ o# m$ N• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ; t) a. d8 ]' u/ U9 R, Y8 ^
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; J: @9 H# s6 w7 G8 d) I: N
• Excellent verbal & written business and technical communication skills;
- h8 r) U" r) C3 u q) _• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
6 h' Z/ w5 O: w7 Y* |, A9 ^
8 s% Y# A. G$ |: V6 E( j" m3 y, _* y8 ^The following experience would be considered a strong asset:
8 _* t4 T0 M5 U* R# a# A$ ]• Multi-tier computing architectures and middleware technologies;
+ L# s4 f, `" \* K• Web-based and 3rd party access authentication mechanisms;
; K4 p0 {; v6 t+ v! x! Q• Demonstrated technical and security solution leadership;
( W7 I) Q2 F7 \7 k9 R/ ]6 o! O, u7 \
Education Accreditation, Certificates and Licenses: 8 ^# p4 K6 q# }9 [+ [/ g$ }) t
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|