鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
) o0 f" W# q" |. l F( ~Job Title: IT - Security Architect * V! v8 o! ?9 i. r
Posted Date: 10/22/2009
4 `, I/ Z% O8 ^6 f$ d3 {! I RDepartment: IT-Admin
2 x) E4 \/ e0 d* v# G$ ?+ S$ mClosing Date: 11/05/2009
4 s) H" h6 s% R2 I" B% d: k' W; k* bLocation: Calgary
+ W+ ~, @$ Q" B! e( kFull/Part Time: Full-Time
' w7 ~- X# d3 y1 @7 }$ n0 k3 rRegular/Temporary: Regular & o( z3 {! L. a7 F) E
5 y% `. P& d' xJob Duties / Responsibilities, N- \$ X/ \) K
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 2 j0 ? r$ b4 l$ a+ e
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; 4 t2 v* P/ D& g$ M! O) i& ~$ E# h1 D
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
* N, K4 Y5 q5 i( ]0 v: E# D! y• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; ~1 N! |% f( G+ r2 f* a7 W
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 7 }$ F- P7 h9 N: q- C# p# }; c
• Share best practice opportunities and provide an industry experience perspective; 0 r R5 R0 N$ J; c
• Support and participate in SOX 404 compliance and Audit review activities.% k% r/ }9 w, p. d
* T" j/ X1 J; {$ U# J4 Y; w
; I: I; @! O3 u/ }" ]! ~+ H
Education / Experience
. E1 R' ~% S" [) l) H• University degree in the field of computer science or other appropriate discipline;
4 k5 ~2 w* \9 L9 h0 O) J• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; + b" m" |7 \; [$ e K
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 3 a3 Q6 a! f" ^8 O2 ]' ?, f- P
• Excellent verbal & written business and technical communication skills;
/ a+ M' k9 F8 Z6 A' w+ b5 M• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
. R1 z& m# {, a. H) ^- n
) Q" Z5 d2 p% y+ h4 S GThe following experience would be considered a strong asset:
# j# k. ]+ e% c2 ]$ m; y. T• Multi-tier computing architectures and middleware technologies;
* U+ ?0 i/ F" q2 |• Web-based and 3rd party access authentication mechanisms;
; J; h: v% Q3 J) b+ u4 R• Demonstrated technical and security solution leadership; / B3 Z5 u$ ]8 W/ E
D; m5 S3 X5 E9 [2 l J
Education Accreditation, Certificates and Licenses:
- a0 p5 I! l |& c; a; l• Possess or be working towards a CISM, CISSP or CCSP certification. |
|