 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting % ^& B' W9 @( a; ?
Job Title: IT - Security Architect ! R9 m# D9 ~) C8 F: J; D1 |$ f# r
Posted Date: 10/22/2009 : V0 `3 l( K# \* `' y
Department: IT-Admin
# I& s" s# S# T6 ^# \& eClosing Date: 11/05/2009 : W4 z) k! |3 Z; J8 V/ z* p
Location: Calgary
4 V! c. ^' X: Y6 W8 W4 w( P( MFull/Part Time: Full-Time 8 O9 M! [* E& s7 g) N: ]
Regular/Temporary: Regular
, g4 F6 a. \3 N6 U8 d8 X! `$ [8 z: t% P' I$ `7 l( N; b. v
Job Duties / Responsibilities+ U L3 F6 x# g& X
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
; a e2 |. m7 {/ X% y• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ( O. @5 R- N# N0 n5 v5 j) E! j
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
9 ?$ I, v6 _( Y% I, J• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; - }+ J: U% y5 q3 a1 }( t( X6 j
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; " H( w7 b' Y$ Q5 E# S
• Share best practice opportunities and provide an industry experience perspective; - n6 s7 |/ w* L7 y# x
• Support and participate in SOX 404 compliance and Audit review activities.
0 K3 C) a. a' M+ D b+ a \# V
$ U5 i$ y3 G6 k# z1 P: [; Q' B6 F& d d2 b1 k2 @- {% F+ N) C
Education / Experience0 b( z, Y9 l, t
• University degree in the field of computer science or other appropriate discipline; & p6 v$ {% x6 y
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; T* @: T9 N3 F( X
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
/ X: ?6 z7 I# `: a U& g0 A• Excellent verbal & written business and technical communication skills; , Q* `; {' y f8 F. N* c
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ' V% ^. Y* M9 U
6 m; j- [& ^# |" ?& d! H8 B. N
The following experience would be considered a strong asset: 5 t# B8 E& c7 W6 v
• Multi-tier computing architectures and middleware technologies; + I5 S8 T! W; v7 ?
• Web-based and 3rd party access authentication mechanisms; $ F. z8 q, l. h! R5 i1 S. c" Y
• Demonstrated technical and security solution leadership;
- ~- H3 [4 j* Z+ x
5 m: M6 v: ?+ @% FEducation Accreditation, Certificates and Licenses:
8 n1 ]) o) ~( C q4 b* u4 J' e• Possess or be working towards a CISM, CISSP or CCSP certification. |
|