 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
- W2 @3 `# S) C- pJob Title: IT - Security Architect ( H; \* {0 @1 J) a8 S" e
Posted Date: 10/22/2009 ' _, u9 X7 V1 p9 `+ }
Department: IT-Admin
6 a8 g6 {% E+ q- Z1 `Closing Date: 11/05/2009 1 o/ d, p. u/ x/ e/ C/ }
Location: Calgary
/ H4 m' o4 z& o, a+ l1 VFull/Part Time: Full-Time " P1 Q _) S Z* ~* K
Regular/Temporary: Regular
4 E5 Y9 s" q# j t& Y" y. A' H8 ^7 f/ s% X2 M
Job Duties / Responsibilities+ ~( d3 H3 o4 \* A: b
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
6 C* u; a6 |) P, O• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
% U; Z9 F; M* v8 c' o3 B) s& R• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
- ]7 a! T$ L9 |1 ]. q+ w1 b• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; - U, k/ k. r/ R8 ?* T! @
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
3 ^3 x) j" R8 F; w1 P8 v! H8 [• Share best practice opportunities and provide an industry experience perspective; . C0 v5 n0 P+ s5 U
• Support and participate in SOX 404 compliance and Audit review activities.+ b( ~1 f/ M+ c- L8 U
6 _4 j; W% L; x, R& `3 W; S) ^% R1 P3 [! k, o. p
Education / Experience
5 ~8 h; c; O" F% R- ^• University degree in the field of computer science or other appropriate discipline;
& G7 c+ U; [# a, G; O• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ' F, {2 L' j; y: o
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; ; q$ p& W1 n, h8 H( @
• Excellent verbal & written business and technical communication skills;
6 R v2 ]' ^1 j. U9 N9 l• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. - S+ D5 f6 i6 f1 Z' i7 Y
; ?+ [; _2 U( s, s" U/ Y
The following experience would be considered a strong asset:
0 ?7 X. Q$ @. r• Multi-tier computing architectures and middleware technologies; 6 Y4 i5 N. o7 |1 m, c( \- U
• Web-based and 3rd party access authentication mechanisms; . x) N" S# o. f) F/ v
• Demonstrated technical and security solution leadership; 4 Y8 h) p- t6 ?7 N' f
3 ?6 Y L! g* n4 J* S
Education Accreditation, Certificates and Licenses: ; y9 Z' i: O, m" z
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|