鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting * Z Z; f# D; B, J% ?
Job Title: IT - Security Architect 4 H7 z6 P: c5 ]9 a& J
Posted Date: 10/22/2009
, ]% w E2 j5 O7 Q& oDepartment: IT-Admin & v% S5 _& K$ y3 n7 F* J
Closing Date: 11/05/2009
. _% M/ Q& x5 a y W8 q MLocation: Calgary
" G1 d0 N, U5 [/ ~Full/Part Time: Full-Time
: R. m/ V' z0 e& N2 b, S6 ]2 }Regular/Temporary: Regular + C* s4 P5 n3 `
, Q5 e5 K: e% k. t8 lJob Duties / Responsibilities" { Q- R$ t6 V( ^
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; 0 k" e7 c% J$ f+ @5 U
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
% C4 g8 W2 V. ?; W: u9 t• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; $ a* \' t5 c {
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
8 p- o8 P% u9 z• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 8 I: z6 a4 u$ P- U- E
• Share best practice opportunities and provide an industry experience perspective; # C9 `. L ? E/ l R) h
• Support and participate in SOX 404 compliance and Audit review activities.! u# M( ~$ k5 Z
: h, p& H8 V7 V0 _+ `" t3 U
+ N- {! P$ P& T4 x. F
Education / Experience
* k3 j* ]# S! ^/ e* k• University degree in the field of computer science or other appropriate discipline; 2 q6 m8 c. ]0 J* P p9 T& }
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 0 h7 N- ]1 c: a9 s/ w1 [2 f
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
" `+ N! ^4 a0 p9 C- |( J# t1 G• Excellent verbal & written business and technical communication skills;
+ L. D; p; Z: {& a• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. 1 Q" L; m1 Q$ E7 x9 f
0 u; K* u& f: o; O- ~' ~The following experience would be considered a strong asset: ; t. P( Y6 N/ A
• Multi-tier computing architectures and middleware technologies; ' X4 d8 o' V1 ~9 P" E9 }) m, G9 {$ a
• Web-based and 3rd party access authentication mechanisms;
1 m& m+ Q) Z' ~6 g- R1 D( h• Demonstrated technical and security solution leadership; 6 s; X8 L9 Y, }( b @5 \; a
& [7 B6 ^& E# o: @3 z; kEducation Accreditation, Certificates and Licenses: 7 }+ V/ i) M" |. d' a4 ^
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|