Why be a part of Maplesoft Group?

Maplesoft implements TimeLive for Electronic time tracking.

Please view the demo below on how to enter and approve time.

Watch Video - TimeLive - Timesheet Entry Demo
Watch Video - TimeLive - Timesheet Approval Demo

Do you want to work in a dynamic environment where your contributions count?

At Maplesoft, we value the contributions of all our employees and contractors. We listen and act upon suggestions, advice, and innovative ideas to further our strategic vision. In turn, Maplesoft contributes to the communities where we live and operate. We think globally, but act in our own backyards.

Build your future with Maplesoft’s exciting technologies, deep partnerships, personal approach to consulting services, professional development opportunities and exciting company culture.

To be considered for new opportunities please send us your resume at


  • Phone Number
  • Filename

    Title Information Technology Security Design Specialist(s)-Level 3
    Location Ottawa Ontario Canada
    Start Date 02-07-2023
    Language English
    Salary Negotiable
    Security Clearance Level 2 - Secret
    Duration 75 days
    Date Posted 01-24-2023
    Job ID 12783
    Recruiter Email
    Maplesoft Group is currently seeking an Information Technology Security Design Specialist(s)-Level 3 for our federal government client in the National Capital region.

    The following responsibilities are associated with the “Statement of Work” but are not
    limited to:


    The scope of this role includes but is not limited to:
    1. Support the completion of the artefacts:
                   • Business Need for Security (BNS) or TBS ConOps
                   • Security Assessment Questionnaire (SAQ)
                   • Statement of Sensitivity (SoS)
                   • Statement of Acceptable Risk (SoAR)
                   • High-Level and detailed System Design
                   • Security Control Traceability Matric (SCTM)
                   • Security Assessment Report (SAR)
                   • Risk Mitigation Plan (RMP)
                   • Statement of Authorization (SoA)
    2. Support the build and testing of the system to make sure it is compliant with security controls highlighted in the SCTM.
    3. Provide information/updates to project team regarding SA&A plan activities.
    4. Supporting cross-workstream integration, planning, and reporting.

    Working with the client's project team, the Information Technology Security Design Specialist(s) Level 3 tasks include but are not limited to the following:
    a) Review, analyze, and/or apply: Architectural methods, frameworks, and models such as TOGAF, US government FEAP, Canadian
                   government BTEP and GSRM, Zachman, UMM
    b) Review, analyze, and/or apply a broad range of security technologies including multiple types of systems and applications
                   architectures, and multiple hardware and software platforms, including:
                   (i) Directory Standards such as X.400, X.500, and SMTP;
                   (ii) Operating Systems such as MS, Unix, Linux, and Novell;
                   (iii) Networking Protocols (for example, HTTP, FTP, Telnet);
                   (iv) Network routers, multiplexers and switches;
                   (v) Domain Name Services (DNS) and Network Time Protocols (NTP);
    c) Review, analyze, and/or apply Secure IT architectures, standards, communications, and security protocols such as IPSec, SSL, SSH,
                   S-MIME, HTTPS;
    d) Review, analyze, and/or apply IT Security protocols at all layers of the Open Systems Interconnection (OSI) and Transmission
                   Control Protocol/Intemet Protocol (TCP/IP) stacks;
    e) Review, analyze, and/or apply the significance and implications of market and technology trends in order to apply them within
                   architecture roadmaps and solution designs, (examples: web services security, incident management, identity management);
    f) Review, analyze, and/or apply Best practices and standards related to the concept of network zoning and defence in-depth principles;
    g) Review, analyze, and/or apply IT Security protocols at all layers of the Open Systems Interconnection (OSI) and Transmission
                   Control Protocol/Internet Protocol (TCP/IP) stacks;
    h) Analyze IT Security statistics, tools and techniques;
    i) Analyze security data and provide advisories and reports;
    j) Prepare technical reports such as requirement analysis, options analysis, technical architecture documents, mathematical risk
    k) Brief senior managers;
    1) Security architecture design and engineering support;
    m) Conduct data security designation/classification studies;
    n) Prepare tailored IT Security alerts and advisories from open and closed sources and complete tasks directly supporting the
                   departmental IT Security and Cyber Protection Program;
    o) Develop and deliver training material relevant to the resource category; and
    p) Conduct knowledge transfer and coaching of the team members.

    Specialties include but are not limited to the following:
    X.400/X.500 (Directory Standards)
    X.509 Certificate Protocols


    The Information Technology Security Design Specialist(s) Level 3 must submit deliverables to the Technical Authority. The individual
    Task Authorization (TA) will define the documents and deliverables required for the specific project Deliverables include but are not
    limited to the following:
    a) A work plan for the work to be undertaken;
    b) Progress report on a bi-weekly or monthly basis on activities undertaken which includes the following:
                   (i) Activities completed within the reporting period;
                   (ii) Planned activities for the next reporting period;
                   (iii) Risks/issues that will require the attention of the Technical Authority; and
                   (iv) Corrective actions required.
    c) Security architectures;
    d) Technical documents and reports (requirement analysis, options analysis, technical architecture documents, mathematical risk
    e) Presentations and other materials, as requested by the Technical Authority; and
    f) Knowledge transfer to designated departmental staff, at the request of the Technical Authority.

    Note that the proposed resource may not be solely responsible for the completion of these deliverables. The consultant will be expected to work collaboratively with staff to ensure the work is completed in a way that ensures maximum knowledge transfer.

    Maplesoft Group prides itself on its distinct corporate culture and recognizes that success is a direct reflection of our most valuable asset - our people.  Therefore, attitude and ambition are key personality traits we seek out, along with skill and aptitude, in potential employees.

    Maplesoft Group is committed to having a diverse, representative workforce and continuing to build an inclusive environment. We encourage applications from all qualified individuals. Maplesoft Group is an equal opportunity employer committed to diversity and inclusion. We are pleased to consider all qualified applicants irrespective of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veterans’ status, Aboriginal peoples or any other legally protected factors. 

    All employment decisions are made based on business needs, job requirements, and individual qualifications. 

    We are committed to developing inclusive, barrier-free recruitment and selection processes, and a work environment that supports our diverse workforce. Please let us know if you require accommodations at any stage of the recruitment process. We can be reached at Maplesoft Info at

    We thank you for your interest in Maplesoft Group and wish to advise you, that only candidates under consideration will be contacted.

    Are you interested in a career with Maplesoft Group? Please see our Career Opportunities page!