 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
; U4 c- y" h6 IJob Title: IT - Security Architect
o9 W" t" R/ I& s8 ?Posted Date: 10/22/2009 " B( S% H+ R" K. i
Department: IT-Admin
0 \7 o5 h1 N* T; F' s" hClosing Date: 11/05/2009 + a: c' T2 S0 Y. d" z: Y: E3 E, A
Location: Calgary $ b6 m4 J: d( ]3 `( X
Full/Part Time: Full-Time 2 R$ }9 r* ^; }9 F/ m! E
Regular/Temporary: Regular
% i1 ?9 ^) ^' z7 \% z% C5 i
8 C- \: ^7 L) n3 m- JJob Duties / Responsibilities
; ?5 Z8 f8 u1 L* F• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
' I2 U6 d9 M. h- _4 w" d! \$ D6 [• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; W4 s/ ^% Q% y5 _$ h7 A* ]
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
b1 ]9 h# c Y4 V' b* o9 ^• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; , O5 ], \" o( W
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; : J% u* E/ `4 ?3 d& e3 k* b) R5 c' _5 V
• Share best practice opportunities and provide an industry experience perspective;
2 m J# L( G h. d& F4 V2 B• Support and participate in SOX 404 compliance and Audit review activities.
- k& m5 Y7 v# A# ~0 E$ D7 b# W* ?" b0 g I' g' F
D7 q' U- f: A9 e `$ B: T
Education / Experience
4 W- ~2 ]: F; D# m- O. Q• University degree in the field of computer science or other appropriate discipline; i0 _2 e0 r/ Q
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; * d) E9 H! L& g- z! ]
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
8 G& a/ p8 b& D" N8 }. W3 ^• Excellent verbal & written business and technical communication skills; & x5 D m4 A$ Q( D* O
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
6 a5 Z% L# \. y1 t4 A6 W) q0 i& d+ [2 x+ U
The following experience would be considered a strong asset: 0 h! V9 D) U! Q
• Multi-tier computing architectures and middleware technologies; ; f, K3 L/ \% e. J" h
• Web-based and 3rd party access authentication mechanisms;
. U+ m! N: |7 M# u% r+ Y5 Z5 E/ I• Demonstrated technical and security solution leadership; 4 I- X. Z+ g6 _' q7 l; u
|; \+ i8 r$ a2 J: \0 u
Education Accreditation, Certificates and Licenses: 6 B; s; D" c9 [/ O/ ~" s
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|