 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting / f- o/ u* `/ |
Job Title: IT - Security Architect
/ S. c5 t& u/ ?8 t: v ^ q- rPosted Date: 10/22/2009 0 V9 x& z+ N& e) V; `
Department: IT-Admin
: h3 K# H3 u& Z. EClosing Date: 11/05/2009 3 H) o; K- T: f+ d" w& ]: F
Location: Calgary
3 U) n. J1 g0 {: L5 {Full/Part Time: Full-Time 7 T7 o1 H$ f3 p2 l) i, F
Regular/Temporary: Regular
% g4 y0 }- m9 u) M3 U# q! B6 n$ v: c; ^" u: j1 \( ^( g
Job Duties / Responsibilities
; d1 l, t; U3 m% M• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; # r& F% j9 J* c( u
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; ( o; G' } B1 n! T7 b
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; - [0 j# b" [3 I+ {+ u7 x
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; " O. C+ v5 y7 B- q2 c
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
# x/ F9 Z7 \, ?' B& W5 u• Share best practice opportunities and provide an industry experience perspective; . O; X: B: N: W/ D/ t
• Support and participate in SOX 404 compliance and Audit review activities.
' a* h; } D0 E2 U* ^, {9 C6 U
) A7 h& a, w' H* @1 p+ tEducation / Experience
: _( b% W4 H2 P& ~7 a• University degree in the field of computer science or other appropriate discipline;
' O! `- `$ f% `• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
) |1 w) m" h# w9 h0 O7 B" E) \# h1 Q% a• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
# b0 A* b5 f8 r, o0 i• Excellent verbal & written business and technical communication skills; " F* X4 D+ f# Q) m: Z, n: l+ K0 [
• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
/ h. f1 B: p/ m W+ w0 p
/ a: c- G: o4 z' M; c5 d5 EThe following experience would be considered a strong asset: 8 m* k5 {( [2 |( s( M+ G
• Multi-tier computing architectures and middleware technologies; ; M h( z" C5 Z1 k3 {, d
• Web-based and 3rd party access authentication mechanisms; & _) q$ V2 i6 _% |6 h
• Demonstrated technical and security solution leadership; & x, U' k0 N5 j: x* j7 O7 B
v" T, K) Q1 oEducation Accreditation, Certificates and Licenses:
, A/ \' z* y/ A: s• Possess or be working towards a CISM, CISSP or CCSP certification. |
|