鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting * W# o4 R6 r, z% Z8 `
Job Title: IT - Security Architect
* ?; e, Q9 t; {0 C+ lPosted Date: 10/22/2009
7 D6 ?0 C9 ~& i4 BDepartment: IT-Admin ) B: v0 j) O D0 k* b. ~
Closing Date: 11/05/2009
. q3 @) G/ Y7 A2 Z; c, @" E1 qLocation: Calgary + q U$ o( {1 N" \: N
Full/Part Time: Full-Time
* V# H: P* D) r# a8 H4 k/ yRegular/Temporary: Regular
7 g) Q0 D p. S
2 L$ F4 j1 D, u; r8 l2 EJob Duties / Responsibilities" m& Z8 B7 r2 Z* o0 U2 U) ?
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment; ; x% Y+ o! f+ ~ z8 o( o7 }) l( M
• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
# L% g( m- k8 v" |& E7 N: `. [9 A• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; - L1 _4 h, m* Q$ l
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; 6 S3 z2 i" X5 Y# x q, M
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations;
( J' S8 H% u6 s+ c4 P3 q4 R• Share best practice opportunities and provide an industry experience perspective; 7 x1 ~% p. O" H; _% o. P) y, r
• Support and participate in SOX 404 compliance and Audit review activities.
( X* e0 a( W# c7 n/ B
9 p( E7 [$ j8 z* n R
1 A7 V% \4 L& u! Q2 J6 m' yEducation / Experience( y. g* q" c4 `+ s4 }) i) {+ W _; c
• University degree in the field of computer science or other appropriate discipline;
! P6 u2 g$ _& z• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards;
, F& |) o: y0 r' e% e3 Z• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required; 8 U( F8 y2 w$ ?8 F" }7 d
• Excellent verbal & written business and technical communication skills;
+ X; D: u1 J' N6 c8 Q• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
- g) s: |' \& c2 a
# c9 m! D! N P$ AThe following experience would be considered a strong asset: $ f! j7 M5 r9 h6 \" r) X( o
• Multi-tier computing architectures and middleware technologies;
. k: s8 |: m1 b• Web-based and 3rd party access authentication mechanisms;
( L8 {- k) P& ^* x+ b9 M• Demonstrated technical and security solution leadership; . @; i8 H8 {: E9 p
0 |2 Z7 H( a) O1 M8 w" T
Education Accreditation, Certificates and Licenses: 5 u# O: t& R. E) ?, \3 c& z
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|