 鲜花( 10)  鸡蛋( 0)
|
Internal Position Posting . \* c' Z! V6 t4 s3 a) R
Job Title: IT - Security Architect % H( o3 ~ D( E7 T3 N6 n; K& ~
Posted Date: 10/22/2009 + A8 |! a' I: {- \% @
Department: IT-Admin
: N/ ]5 H; P8 S: ?$ |3 zClosing Date: 11/05/2009
/ w- o% e8 g( w- ^! r QLocation: Calgary ; X6 g& z4 T) R0 V6 t/ f
Full/Part Time: Full-Time
5 N% s5 `6 i! Z- V. u; H+ C1 DRegular/Temporary: Regular ; |' n4 P# l R! `3 z5 a
1 N2 X7 M* w0 z; Q
Job Duties / Responsibilities
5 `6 `* O( b$ _0 E8 U' c• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
* a" q6 M" I5 K$ S4 w4 b! E• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
! }( R+ e8 A% t# O' X: I• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
3 h7 m2 U4 e! Q• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
% q( B; Z% I- R- q1 J+ o• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; # x* S. w y7 e" X2 z6 X) a
• Share best practice opportunities and provide an industry experience perspective;
% |4 L' C/ J8 I( f- W9 t g• Support and participate in SOX 404 compliance and Audit review activities.
# z6 ?8 w A: g6 `- t* a% d$ E4 ~2 Q: g4 p- r
' x7 k3 m2 X: Y, I
Education / Experience
o& q3 L7 a% F( k' `, z! G• University degree in the field of computer science or other appropriate discipline;
, B/ }, k6 H8 C: S5 s0 n3 p. j# i( \• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
7 m4 {6 T- J% t- ~/ `* A/ {• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
' @ P* M% s& E- g3 n: V0 P) {• Excellent verbal & written business and technical communication skills;
# D0 e; }: A" L! W- S9 Z2 ^9 H6 H7 [. ?4 `• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. # M- a1 w& _' I4 h& n# D6 b! y
8 }/ C+ M; P9 U7 b" ^) b" `The following experience would be considered a strong asset: ; _# @) d" P. Q/ ~
• Multi-tier computing architectures and middleware technologies;
0 K2 S+ N% W F• Web-based and 3rd party access authentication mechanisms;
4 ?& X! F0 o# @! d3 N1 Q. u• Demonstrated technical and security solution leadership; ! S% X$ E. Q) _1 C' ^) |. |
% e6 E/ ~' S0 n6 ^
Education Accreditation, Certificates and Licenses: - u9 [7 A* n8 q
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|