鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting
& ^7 @3 ?+ k8 ]& O* [$ |Job Title: IT - Security Architect
# C2 Z" \- [' j# kPosted Date: 10/22/2009 ' q8 K6 W6 b0 w w( K! }
Department: IT-Admin . `, s2 w0 @9 Q$ T0 p: ^
Closing Date: 11/05/2009
9 l9 F% n( ~9 Y0 y% jLocation: Calgary 2 ]' p8 k8 k0 Z4 M' j
Full/Part Time: Full-Time
* X H4 e! L- p/ RRegular/Temporary: Regular ; q" _/ q3 Z1 y6 p0 L( _6 ~# F
. U0 \$ ?' _, o$ p8 f/ W
Job Duties / Responsibilities: M0 {9 v1 V+ G+ M$ ?1 ?# F# x) ]
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
( u0 V5 ?; e( x9 e& q8 Z" z• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
; Z5 w3 p# b& |' R6 }• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 7 z% \8 N( B( X% v+ K+ M2 Z5 C
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
/ }: Z: P0 M4 S5 |' I! z• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
/ z, H/ s& ~& i1 [, u• Share best practice opportunities and provide an industry experience perspective; ! L7 o$ x* l" K2 W" K( b
• Support and participate in SOX 404 compliance and Audit review activities., L7 D* |0 U" B$ x- H0 ?
& {) s% r7 _) ^! a- r3 G. E! L8 r& W
7 M" ]4 z" s# d0 l5 _* q* d. O8 L% _+ X
Education / Experience8 c. S5 f9 |, t0 d; P
• University degree in the field of computer science or other appropriate discipline;
V6 z0 r- o0 e: D. O• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; ) C5 q) {9 [6 R- k- L5 s& {- X
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 7 v+ b- U) z. Z0 N
• Excellent verbal & written business and technical communication skills;
& V5 n+ p) i8 a1 X4 I% k! T• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
, c7 n7 n) b5 b; h6 A( x7 j r, t ^& `
The following experience would be considered a strong asset: $ a* E! j0 y" j: E5 v \
• Multi-tier computing architectures and middleware technologies;
% d) J! n$ S+ j2 J4 \• Web-based and 3rd party access authentication mechanisms; 7 f0 W( e+ c+ M9 |
• Demonstrated technical and security solution leadership;
, w t0 O! D/ h+ M2 J
' U! @' b1 ?6 N# uEducation Accreditation, Certificates and Licenses: # @! R; P- g. t
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|