鲜花( 10) 鸡蛋( 0)
|
Internal Position Posting 1 w/ H3 p' n+ K1 i
Job Title: IT - Security Architect 4 x, F Z& ]. V+ z3 d
Posted Date: 10/22/2009 + x6 a! v0 H+ H" R9 Z6 i
Department: IT-Admin 9 C8 h% y+ K0 g6 j5 k( {
Closing Date: 11/05/2009 : @) c! _% { u3 C4 |0 {
Location: Calgary . |* z: y1 U: A1 J. Z8 s, ^
Full/Part Time: Full-Time . E+ Z, [; v% G
Regular/Temporary: Regular 5 c( J# p5 h. X" D( ~) @
1 }+ J# v, k- zJob Duties / Responsibilities
$ [# r! X- z' @" v' V8 E P• Develop, manage and maintain a Security Architecture for deployment across a wide geographical and distributed environment;
9 h; w2 u% L" ?$ M, c0 J: K- q• Contribute to the implementation and sustainment of a comprehensive security framework, supportive of the architecture;
) Z0 z$ g& M3 b) J% X2 R• Participate in I/T and business discussions promoting the benefits and requirements of secure computing solutions; 5 H2 L5 s! A8 e) v* O6 J$ |' \
• Be active in operational security activities such as security event assessments and investigations, review of vendor products / testing, H/W and S/W implementations and roll outs, and rotational on-call assignments; # a n0 S( M; |# q
• Identify and resolve security issues and items that may result from security assessments or technical solution implementations; 7 x; ^7 t+ v% j% T" g
• Share best practice opportunities and provide an industry experience perspective;
2 |' I9 T: s' C' X' ]( j: Y# H• Support and participate in SOX 404 compliance and Audit review activities., w8 d" G" U n1 Z( z
5 `3 @! w! o/ G
# u: \% I5 C) y& M
Education / Experience! v6 A1 A+ W& ~* t
• University degree in the field of computer science or other appropriate discipline;
# s$ o7 s& }. \2 c7 x; _: f• Experience with F/W, IPS/IDS, AV, Encryption Techniques, PKI, DR , UNIX, INTEL, Vul/Pen Testing, security awareness and enforcement, security policy and standards; . N% X: l U4 r( t- k4 t( W
• Knowledge of privacy legislation, IT Governance, SOX 404 and ISO27001 required;
- ?4 j1 ]- Y6 t+ A, i9 y2 C4 j( w• Excellent verbal & written business and technical communication skills;
& n& `) S. v. B' _5 R& L; f+ t• Preference will be given to individuals with a minimum of 5 to 10 years of industry experience.
: p& p) g9 p. O$ k
3 e% s8 h% x* B" `6 L8 q* s. sThe following experience would be considered a strong asset:
& B$ c1 `3 z9 K* r+ E/ F• Multi-tier computing architectures and middleware technologies; % |# Y; e- G7 V; C5 X3 p& M
• Web-based and 3rd party access authentication mechanisms;
$ d3 H' y3 i) t$ {9 p( L; y• Demonstrated technical and security solution leadership; . B7 ~9 @- Q' d$ n/ l$ _" S# l# b
7 j9 {5 t+ ^ |1 ~% \8 y' U! }* C1 tEducation Accreditation, Certificates and Licenses: - A- ^2 k; Y4 b |9 x
• Possess or be working towards a CISM, CISSP or CCSP certification. |
|