Careers

Why be a part of Maplesoft Group?

Maplesoft implements TimeLive for Electronic time tracking.

Please view the demo below on how to enter and approve time.

Watch Video - TimeLive - Timesheet Entry Demo
Watch Video - TimeLive - Timesheet Approval Demo

Do you want to work in a dynamic environment where your contributions count?

At Maplesoft, we value the contributions of all our employees and contractors. We listen and act upon suggestions, advice, and innovative ideas to further our strategic vision. In turn, Maplesoft contributes to the communities where we live and operate. We think globally, but act in our own backyards.

Build your future with Maplesoft’s exciting technologies, deep partnerships, personal approach to consulting services, professional development opportunities and exciting company culture.

To be considered for new opportunities please send us your resume at info@maplesoftgroup.com

Loading


  • Phone Number
  • Filename
    Status
    Size

    Back
    Title IT Security Design Specialist Level 3
    Location Remote
    Start Date 01-04-2022
    Language English
    Salary Negotiable
    Security Clearance Secret
    Duration 3 Months + Extension
    Date Posted 01-04-2022
    Job ID 12479
    Recruiter Email
    Maplesoft Group is currently seeking a IT Security Design Specialist Level 3 to join one of our Federal Government clients located in Ottawa.


    The following responsibilities are associated with the “Statement of Work” but are not
    limited to:
    1. Provide expertise on information security and GC security policy.
    2. Develop artifacts related to the technology area for which they have been contracted.
    This may include the following types of deliverables:
    ➢ SA&A Plans
    ➢ Schedules
    ➢ Test/Security test strategies
    ➢ Detailed Designs for system components
    ➢ Test Plans/Test Results
    3. Conduct and participate in design reviews.
    4. Provide architectural input and security design support to the overall design and
    development processes.
    5. Provide support to sales and product management groups for all GCSI programme
    requirements.
    6. Provide management, mentoring and oversight to the GCSI team; and
    7. Other related activities as determined by the SSC Authorities.
    8. Management collateral on all service security and SA&A requirements.
    9. System and subsystem solution designs compliant with policy, business, security,
    operational and support requirements.
    10. Detailed system and subsystem technical, development, integration, interface and build
    documentation.
    11. Functional and technical test plans, test cases and test results documentation.
    12. Technical collateral for cost/benefit analysis and proposals.
    13. Detailed root cause analysis documentation.
    14. Detailed Change Request technical analysis documentation; and Operational collateral.
    15. Work in partnership with all stakeholders to identify technical architecture, challenges,
    risks, and recommendations for various SSC projects related to the SSC’s Transformation
    Programs/Initiatives.
    16. Collaborate with all stakeholders on the evaluation of any relevant data from service
    providers, transformation teams, project management build teams and operational teams.
    17. Program as well as other CITS core transformation programs.
    18. Conduct analysis of Current State Assessments in support of GC and SSC Cyber and IT
    Security core transformation programs.
    19. Produce various security artifacts as needed.
    20. Participation in related IT Security meetings, discussions and presentations to
    stakeholders or senior management.
    21. Document, review and track actions and meetings decisions.
    22. Perform functional and options analysis in support of program delivery.
    23. Perform impact analysis with the perspective of an enterprise solution, evaluate and make
    recommendations.
    24. Create presentations and present to various stakeholders and facilitate meetings and
    discussions.
    25. Provide Security Training & Awareness.
    26. IT Security requirements support for GC and SSC Cyber and IT Security Transformation
    Programs comprised of, but not limited to:
    ➢ Review business and IT Security requirements from various SSC programs and
    initiatives
    ➢ Work in partnership with all stakeholders to develop security control profiles based
    on CSEC ITSG-33 and other related security standards, in support of various SSC
    projects related to SSC’s Transformation Programs/Initiatives
    ➢ Validate IT Security requirements by mapping business and/or security
    requirements through the various stages of the Information System Security
    Implementation Process (ISSIP)
    ➢ Analyze and evaluate client requirements and documentation
    ➢ Plan, conceptualize, coordinate, and document recommendations for solutions
    based on client requirements
    ➢ Perform functional and options analysis in support of program delivery
    ➢ Perform impact analysis with the perspective of an enterprise solution, evaluate
    and make recommendations.
    27. IT Security strategies, frameworks, models, methodologies, roadmaps, plans, heat maps,
    RACI matrices, policies, instruments in the areas of, but not limited to:
    ➢ Security Risk Management, including risk assessment methodologies
    ➢ Security Assessment & Authorization (SA&A)
    ➢ Security Program Management and Governance, including organizational and/or
    functional design or review, and IS and/or ITS program-level compliance reporting
    ➢ Review/analyze various SSC and/or TBS transformation initiative deliverables and
    ensure compliance, alignment, and conformity of deliverables with Government of
    Canada (e.g., TBS, CSEC, PS, SSC) IT Security strategies, principles,
    methodologies, frameworks, programs, policies and instruments (directives,
    standards, guidelines), and procedures
    ➢ Develop IT Security standards, procedures, and guidelines pursuant to the
    requirements of Canada’s National Security Policy, Treasury Board Secretariat’s Policy on Government Security, and supporting operational standards (e.g., MITS),
    departmental/agency security policy, and other relevant standards, procedures,
    and guidelines
    ➢ Develop IT Security policy in the areas of IT security and assurance, standard
    Certification & Accreditation frameworks for IT systems, information infrastructure
    protection, product evaluation, privacy, Business Continuity Planning, contingency
    planning and Disaster Response Planning, Research & Development, and IT
    Security Service Management.
    28. IT Security risk management comprised of, but not limited to:
    ➢ Review/analyze various SSC and/or TBS transformation initiative deliverables and
    ensure compliance, alignment, and conformity of deliverables with Government of
    Canada (e.g., TBS, CSEC, PS, SSC) IT Security strategies, principles,
    methodologies, frameworks, programs, policies and instruments (directives,
    standards, guidelines), and procedures
    ➢ Recommendations for IT Security risk mitigation and other related deliverables, as
    required.
    29. Additional deliverables requirements for Cyber Security sub-Program (but are not limited
    to):
    ➢ Assist in completing all necessary documentation (such as Reports, Roadmaps,
    and Presentation decks) on various current-state assessments (such as
    Communications Security (COMSEC), Local Information Protection Centre (LIPC)
    ➢ Document security related processes for transformation initiatives).
    30. Additional deliverables requirements for Enterprise Security Requirements Definition SubProgram (but are not limited to):
    ➢ Document requirements-gathering and security assurance input related to large
    scale Telecom and Converged Communications projects and possibly for other
    SSC Transformation Programs
    ➢ Create and document service definitions for Telecom and Converged
    Communications-related projects, and possibly for other SSC Transformation
    Programs
    ➢ Per ITSG-33 ISSIP security lifecycle process, determine and document related
    security controls based on GC, NIST and other guidance for input into Enterprise
    architecture documents, RFP SOWs, and in order to fulfill the SA&A process. Input
    will be required commencing with the Concept phase and continuing through to the
    Installation phase.
    31. Perform and document Threat Assessments Reports.
    Note that the proposed resource may not be solely responsible for the completion of these
    deliverables. The consultant will be expected to work collaboratively with staff to ensure the work
    is completed in a way that ensures maximum knowledge transfer.


    Maplesoft Group prides itself on its distinct corporate culture and recognizes that success is a direct reflection of our most valuable asset - our people.  Therefore, attitude and ambition are key personality traits we seek out, along with skill and aptitude, in potential employees.

    Maplesoft Group is committed to having a diverse, representative workforce and continuing to build an inclusive environment. We encourage applications from all qualified individuals. Maplesoft Group is an equal opportunity employer committed to diversity and inclusion. We are pleased to consider all qualified applicants irrespective of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veterans’ status, Aboriginal peoples or any other legally protected factors. 

    All employment decisions are made based on business needs, job requirements, and individual qualifications. 

    We are committed to developing inclusive, barrier-free recruitment and selection processes, and a work environment that supports our diverse workforce. Please let us know if you require accommodations at any stage of the recruitment process. We can be reached at Maplesoft Info at info@maplesoftgroup.com.

    We thank you for your interest in Maplesoft Group and wish to advise you, that only candidates under consideration will be contacted.

    Are you interested in a career with Maplesoft Group? Please see our Career Opportunities page!


    SEE CAREER OPPORTUNITIES