Why be a part of Maplesoft Group?

Maplesoft implements TimeLive for Electronic time tracking.

Please view the demo below on how to enter and approve time.

Watch Video - TimeLive - Timesheet Entry Demo
Watch Video - TimeLive - Timesheet Approval Demo

Do you want to work in a dynamic environment where your contributions count?

At Maplesoft, we value the contributions of all our employees and contractors. We listen and act upon suggestions, advice, and innovative ideas to further our strategic vision. In turn, Maplesoft contributes to the communities where we live and operate. We think globally, but act in our own backyards.

Build your future with Maplesoft’s exciting technologies, deep partnerships, personal approach to consulting services, professional development opportunities and exciting company culture.

To be considered for new opportunities please send us your resume at


  • Phone Number
  • Filename

    Title IT Security Design Specialist Level 3
    Location Remote
    Start Date 12-01-2021
    Language English
    Salary Negotiable
    Security Clearance Secret
    Duration 5 Months + Extension
    Date Posted 12-10-2021
    Job ID 12465
    Recruiter Email

    Maplesoft Group is currently seeking an IT Security Design Specialist Level 3 to join one of our clients located in Ottawa.

    The Security Planning and Integration team have overall responsibility to establish the strategy for data/log collection, analysis and SIEM tool selection in support of our client's Security Operations group. A resource is being sought to support this effort from planning, procurement, proofs of concept and capability design.

    The following responsibilities are associated with the “Statement of Work” but are not limited to:
    - Provide expertise on information security and GC security policy.

    - Develop artifacts related to the technology area for which they have been contracted. This may include the following types of deliverables:

    ➢    SA&A Plans

    ➢    Schedules

    ➢    Test/Security test strategies

    ➢    Detailed Designs for system components

    ➢    Test Plans/Test Results

    - Conduct and participate in design reviews.

    - Provide architectural input and security design support to the overall design and development processes.

    - Provide support to sales and product management groups for all GCSI programme requirements.

    - Provide management, mentoring and oversight to the GCSI team; and

    - Management collateral on all service security and SA&A requirements.

    - System and subsystem solution designs compliant with policy, business, security, operational and support requirements.

    - Detailed system and subsystem technical, development, integration, interface and build documentation.

    - Functional and technical test plans, test cases and test results documentation.

    - Technical collateral for cost/benefit analysis and proposals.

    - Detailed root cause analysis documentation.

    - Detailed Change Request technical analysis documentation; and Operational collateral.

    - Work in partnership with all stakeholders to identify technical architecture, challenges, risks, and recommendations for various client projects related to the client's Transformation Programs/Initiatives.

    - Collaborate with all stakeholders on the evaluation of any relevant data from service providers, transformation teams, project management build teams and operational teams.

    - Program as well as other CITS core transformation programs.

    - Conduct analysis of Current State Assessments in support of GC and SSC Cyber and IT Security core transformation programs.

    - Produce various security artifacts as needed.

    - Participation in related IT Security meetings, discussions and presentations to stakeholders or senior management.

    - Document, review and track actions and meetings decisions.

    - Perform functional and options analysis in support of program delivery.

    - Perform impact analysis with the perspective of an enterprise solution, evaluate and make recommendations.

    - Create presentations and present to various stakeholders and facilitate meetings and discussions.
    Provide Security Training & Awareness.

    IT Security requirements support for GC and SSC Cyber and IT Security Transformation Programs comprised of, but not limited to:

    ➢    Review business and IT Security requirements from various SSC programs and initiatives

    ➢    Work in partnership with all stakeholders to develop security control profiles based on CSEC ITSG-33 and other related security standards, in support of various SSC projects related to the client’s Transformation Programs/Initiatives

    ➢    Validate IT Security requirements by mapping business and/or security requirements through the various stages of the Information System Security Implementation Process (ISSIP)

    ➢    Analyze and evaluate client requirements and documentation

    ➢    Plan, conceptualize, coordinate, and document recommendations for solutions based on client requirements

    ➢    Perform functional and options analysis in support of program delivery

    ➢    Perform impact analysis with the perspective of an enterprise solution, evaluate and make recommendations.

    IT Security strategies, frameworks, models, methodologies, roadmaps, plans, heat maps, RACI matrices, policies, instruments in the areas of, but not limited to:

    ➢    Security Risk Management, including risk assessment methodologies

    ➢    Security Assessment & Authorization (SA&A)

    ➢    Security Program Management and Governance, including organizational and/or functional design or review, and IS and/or ITS program-level compliance reporting

    ➢    Review/analyze various transformation initiative deliverables and ensure compliance, alignment, and conformity of deliverables with Government of Canada (e.g., TBS, CSEC, PS, SSC) IT Security strategies, principles, methodologies, frameworks, programs, policies and instruments (directives, standards, guidelines), and procedures

    ➢    Develop IT Security standards, procedures, and guidelines pursuant to the requirements of Canada’s National Security Policy, Treasury Board Secretariat’s Policy on Government Security, and supporting operational standards (e.g., MITS), departmental/agency security policy, and other relevant standards, procedures, and guidelines

    ➢    Develop IT Security policy in the areas of IT security and assurance, standard Certification & Accreditation frameworks for IT systems, information infrastructure protection, product evaluation, privacy, Business Continuity Planning, contingency planning and Disaster Response Planning, Research & Development, and IT Security Service Management.

    IT Security risk management comprised of, but not limited to:

    ➢    Review/analyze various transformation initiative deliverables and ensure compliance, alignment, and conformity of deliverables with Government of Canada (e.g., TBS, CSEC, PS, SSC) IT Security strategies, principles, methodologies, frameworks, programs, policies and instruments (directives, standards, guidelines), and procedures

    ➢    Recommendations for IT Security risk mitigation and other related deliverables, as required.

    Additional deliverables requirements for Cyber Security sub-Program (but are not limited to):

    ➢    Assist in completing all necessary documentation (such as Reports, Roadmaps, and Presentation decks) on various current-state assessments (such as Communications Security (COMSEC), Local Information Protection Centre (LIPC)

    ➢    Document security related processes for transformation initiatives).

    Additional deliverables requirements for Enterprise Security Requirements Definition Sub-Program (but are not limited to):

    ➢    Document requirements-gathering and security assurance input related to large scale Telecom and Converged Communications projects and possibly for other client Transformation Programs

    ➢    Create and document service definitions for Telecom and Converged Communications-related projects, and possibly for other SSC Transformation Programs

    ➢    Per ITSG-33 ISSIP security lifecycle process, determine and document related security controls based on GC, NIST and other guidance for input into Enterprise architecture documents, RFP SOWs, and in order to fulfill the SA&A process. Input will be required commencing with the Concept phase and continuing through to the Installation phase.

    - Perform and document Threat Assessments Reports.

    *Note that the proposed resource may not be solely responsible for the completion of these deliverables. The consultant will be expected to work collaboratively with staff to ensure the work is completed in a way that ensures maximum knowledge transfer.

    Maplesoft Group prides itself on its distinct corporate culture and recognizes that success is a direct reflection of our most valuable asset - our people.  Therefore, attitude and ambition are key personality traits we seek out, along with skill and aptitude, in potential employees.

    Maplesoft Group is committed to having a diverse, representative workforce and continuing to build an inclusive environment. We encourage applications from all qualified individuals. Maplesoft Group is an equal opportunity employer committed to diversity and inclusion. We are pleased to consider all qualified applicants irrespective of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veterans’ status, Aboriginal peoples or any other legally protected factors. 

    All employment decisions are made based on business needs, job requirements, and individual qualifications. 

    We are committed to developing inclusive, barrier-free recruitment and selection processes, and a work environment that supports our diverse workforce. Please let us know if you require accommodations at any stage of the recruitment process. We can be reached at Maplesoft Info at

    We thank you for your interest in Maplesoft Group and wish to advise you, that only candidates under consideration will be contacted.

    Are you interested in a career with Maplesoft Group? Please see our Career Opportunities page!