 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting
& }. b; U6 a1 D5 fJob Title: IT - Security Architect ( F" Q* C* a( c3 R
Posted Date: 10/22/2009
6 ?7 p5 H2 M k7 @# mDepartment: IT-Admin
- Y$ Q* V/ {2 q9 Y( w, AClosing Date: 11/05/2009 % n4 ^' g$ T0 o! f$ e( G! W- S
Location: Calgary 4 g+ u O5 S8 ^5 X; P' A
Full/Part Time: Full-Time
& x0 @# Y) C3 Z1 s9 t" e- hRegular/Temporary: Regular
# h$ C9 y, ~ `+ v; ~2 V. Q* }' h( U. i- v2 ~( ~2 `+ ?
Job Duties / Responsibilities
3 k4 l( t4 k6 L7 ]3 k• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
; d! b) u# `7 `6 @# r' X& C• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; - E; R5 ~# ^7 L1 f* q$ ]
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
% c) l. ?0 e+ V9 V; m. Q: p• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; : d, ?4 a9 e; C9 |0 n
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # i0 P5 K, e% [( ~% \
• Share best practice opportunities and provide an industry experience perspective; 9 y) j3 ?8 y1 y" |
• Support and participate in SOX 404 compliance and Audit review activities.
: G; |3 I2 w+ d. `
% c r7 |+ E+ h a, ~1 f1 p5 q' M: \* E. N, m. W
Education / Experience
+ D& J% `; Y4 }& ]9 X7 u0 [• University degree in the field of computer science or other appropriate discipline; 9 |7 K2 J2 o7 |3 S2 d5 Q* o2 S
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
5 b) q: l+ k& M6 `2 X5 }* ~• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
) [4 J; ^7 V2 o* h! l. Q0 A& P: c' u• Excellent verbal & written business and technical communication skills;
8 @& D0 B7 |4 @) l+ U' N. @• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. . y9 \; o- H x$ J, o8 _
7 v" P l& h$ Q- \" M" ^/ \
The following experience would be considered a strong asset:
1 Q& C0 a) V: I1 U0 O8 a E• Multi-tier computing architectures and middleware technologies; " W* |" q! t( f u
• Web-based and 3rd party access authentication mechanisms; ) S$ q' j, n7 u. ?- F) m
• Demonstrated technical and security solution leadership;
* I; p$ S; h: @, l% h* y5 g- `( a. r4 Q U: S3 w8 M& J! h' a) E- u
Education Accreditation, Certificates and Licenses: }+ F! S% c" n# w. `2 D- W" S
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|