Why be a part of Maplesoft Group?

Maplesoft implements TimeLive for Electronic time tracking.

Please view the demo below on how to enter and approve time.

Watch Video - TimeLive - Timesheet Entry Demo
Watch Video - TimeLive - Timesheet Approval Demo

Do you want to work in a dynamic environment where your contributions count?

At Maplesoft, we value the contributions of all our employees and contractors. We listen and act upon suggestions, advice, and innovative ideas to further our strategic vision. In turn, Maplesoft contributes to the communities where we live and operate. We think globally, but act in our own backyards.

Build your future with Maplesoft’s exciting technologies, deep partnerships, personal approach to consulting services, professional development opportunities and exciting company culture.

To be considered for new opportunities please send us your resume at


  • Phone Number
  • Filename

    Title Security Engineer - Level 3
    Location Remote
    Start Date 09-27-2022
    Language English
    Salary Negotiable
    Security Clearance Secret
    Duration 6-Months
    Date Posted 09-20-2022
    Job ID 12719
    Recruiter Email
    Maplesoft Group is currently seeking a Security Engineer - Level 3 for one of our Federal Government clients in the National Capital Region. This work can be done remotely. 

    The following responsibilities are associated with the “Statement Of Work” but are not limited to:

    1. Analyze existing services; propose, design, develop and implement improved overall systems design user experience, security controls, safeguards in accordance with government policies and standards.
    2. Analyze IT Security Infrastructure and services statistics including security log analysis and other systems operational logs and events analysis).
    3. Analyze IT Security Infrastructure tools and techniques.
    4. Analyze data and provide advice and reports.
    5. Assist in implementation strategies.
    6. Assist in producing the following illustrative deliverables:
    System and subsystem solution designs compliant with policy, business, security, operational and support requirements.
    Detailed system and subsystem technical, development, integration, interface and build documentation
    Functional and technical test plans, test cases and test results documentation
    Technical collateral for cost/benefit analysis and proposals
    Detailed root cause analysis documentation; Detailed Change Request technical analysis documentation; and Operational collateral
    7. Conduct systems integration and development of selected services, sub-services, and applications.
    8. Create and maintain the following:
    Documentation: structured analysis and recommendations, weekly status reports, installation procedures, build books, maintenance procedures, business requirements analysis, network topologies, specifications and standards, design documentation, solution and implementation requests, support procedures, backup and restore procedures, etc.
    9. Deliver design and prototypes for the delivery of new service offerings.
    10. Identify the technical threats to, and vulnerabilities of networks and systems.
    11. Review, analyze, evaluate, and/or apply: 
    Directory, authentication, and authorization protocols such as LDAP, Kerberos, SAML, OpenID Connect, or any future security authentication protocols
    Identity Management processes, best practices, standards, policies and supporting technologies
    Operating Systems such as Windows, Unix and Linux
    Networking Protocols such as HTTP, FTP, and Telnet
    Secure IT architectures fundamentals, standards, communications, and security protocols such as IPSec, IPv6, SSL, and SSH
    IT Security protocols at all layers of the Open Systems Interconnection (OSI) and Transmission Control
    Protocol/Internet Protocol (TCP/IP) stacks
    Domain Name Services (DNS), DHCP and Network Time Protocols (NTP)
    Network routers, multiplexers, and switches
    Application, host and/or Network hardening and security best practices such as shell scripting, service identification, and access control
    Intrusion detection/prevention systems (HIDS/HIPS), Network-based Intrusion Defence Systems, malicious code defence, file integrity, Enterprise Security Management, Security Information and Event Management (SIEM) Systems and/or firewalls
    Data Parsing
    Wireless technology
    Cryptographic Algorithms
    12. Manage the IT Security configuration.
    13. Monitor and develop reporting for system utilization and performance metrics. 
    14. Perform lab testing to evaluate fixes, new features, and system interoperability.
    15. Prepare technical reports such as IT Security Solutions option analysis and implementation plans.
    16. Provide cross training and knowledge transfer to other support personnel.
    17. Provide engineering support through planning and implementing complex changes in large scale multi-tenant networked environments.
    18. Provide Independent Verification and Validation (IV&V) support to IT Security related projects.
    19. Provide network security expertise on multi-disciplinary project teams to develop design alternatives.
    20. Provide operational support for firewalls / VPNs / web content filtering infrastructure by performing change.
    21. Review perimeter security requirements and develop cost effective responses.
    22. Review, assess, develop alternatives, and recommendations for perimeter security approaches, technology, and processes.
    23. Provide expertise as well as design and implement solutions including Directory Technologies, Directory ETL systems, Authentication and Authorization Systems, Identity Management Systems, Credentials Management systems as well as business applications integrations.

    Maplesoft Group prides itself on its distinct corporate culture and recognizes that success is a direct reflection of our most valuable asset - our people.  Therefore, attitude and ambition are key personality traits we seek out, along with skill and aptitude, in potential employees.

    Maplesoft Group is committed to having a diverse, representative workforce and continuing to build an inclusive environment. We encourage applications from all qualified individuals. Maplesoft Group is an equal opportunity employer committed to diversity and inclusion. We are pleased to consider all qualified applicants irrespective of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veterans’ status, Aboriginal peoples or any other legally protected factors. 

    All employment decisions are made based on business needs, job requirements, and individual qualifications. 

    We are committed to developing inclusive, barrier-free recruitment and selection processes, and a work environment that supports our diverse workforce. Please let us know if you require accommodations at any stage of the recruitment process. We can be reached at Maplesoft Info at

    We thank you for your interest in Maplesoft Group and wish to advise you, that only candidates under consideration will be contacted.

    Are you interested in a career with Maplesoft Group? Please see our Career Opportunities page!