鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting - X7 e& }3 S5 s" e
Job Title: IT - Security Architect
4 P1 w/ Z) w9 Y* bPosted Date: 10/22/2009
; U& m- T1 B, o: g4 PDepartment: IT-Admin
3 v# V% e* K( l% \: M5 U3 c/ {Closing Date: 11/05/2009 2 x, B2 P/ L- i, M8 R3 h& |
Location: Calgary 6 W1 K2 @" b* s: J
Full/Part Time: Full-Time 5 R9 z! A# M$ \+ Z# m# y5 [
Regular/Temporary: Regular
: M7 s+ m3 E h6 \2 p2 A) P* W. [+ |7 g
Job Duties / Responsibilities9 I0 f1 h4 i4 [5 F: g6 R* T% F
• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
. J2 y$ @% s A0 p• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture; * y3 P7 \! r8 B' R5 J C
• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions;
" D& K2 Y8 N% n6 |+ V3 T3 N" t% j% F4 f• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments;
s1 L1 u8 b1 d5 [; u• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 9 R- W& K. O4 @' s
• Share best practice opportunities and provide an industry experience perspective;
/ w0 C1 j$ X% B/ ~• Support and participate in SOX 404 compliance and Audit review activities.
. M0 |: R+ ?6 d) `* ~) w
# u& }# B7 x+ Q2 f8 p9 h3 s9 F. p K- q
Education / Experience+ v* @" ~1 S$ d% c+ g) q& e
• University degree in the field of computer science or other appropriate discipline; * j. a6 w" L- Q R9 y
• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; 8 l, ~; B% O# k" o" D. t) L. g7 v
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
; B w, I% a+ f7 L, M• Excellent verbal & written business and technical communication skills;
. T% i& m8 z @: C, F• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience. ' w" H4 ~+ t7 V. S1 z: ^
3 z+ e0 I5 w7 yThe following experience would be considered a strong asset:
: m" q! N+ f( Z* J• Multi-tier computing architectures and middleware technologies; ; V& K4 h, g+ x3 g% ? N) |
• Web-based and 3rd party access authentication mechanisms;
. Q1 Q6 L# O) Y% ~ X4 `2 I• Demonstrated technical and security solution leadership;
# b" I! W7 p5 x1 ^0 A7 a
/ w4 ]3 t- _! D& S V6 qEducation Accreditation, Certificates and Licenses:
* F2 i9 [% u+ ^• Possess or be working towards a CISM, CISSP or CCSP certification. |
|