Why be a part of Maplesoft Group?

Maplesoft implements TimeLive for Electronic time tracking.

Please view the demo below on how to enter and approve time.

Watch Video - TimeLive - Timesheet Entry Demo
Watch Video - TimeLive - Timesheet Approval Demo

Do you want to work in a dynamic environment where your contributions count?

At Maplesoft, we value the contributions of all our employees and contractors. We listen and act upon suggestions, advice, and innovative ideas to further our strategic vision. In turn, Maplesoft contributes to the communities where we live and operate. We think globally, but act in our own backyards.

Build your future with Maplesoft’s exciting technologies, deep partnerships, personal approach to consulting services, professional development opportunities and exciting company culture.

To be considered for new opportunities please send us your resume at


  • Filename

    Title IT Security Engineer (Level 3)
    Location Ottawa, ON
    Start Date 10-16-2023
    Language English
    Salary Negotiable
    Security Clearance Level 2 - Secret
    Duration 4 Months
    Date Posted 09-14-2023
    Job ID 13098
    Recruiter Email
    Maplesoft Group is currently seeking a IT Security Engineer (Level 3) for our Federal Government client.

    The following responsibilities are associated with the “Statement of Work” but are not limited to:

    1. Analyze existing services; propose, design, develop and implement improved overall
    systems design user experience, security controls, safeguards in accordance with
    government policies and standards.
    2. Analyze IT Security Infrastructure and services statistics including security log analysis
    and other systems operational logs and events analysis).
    3. Analyze IT Security Infrastructure tools and techniques.
    4. Analyze data and provide advice and reports.
    5. Assist in implementation strategies.
    6. Assist in producing the following illustrative deliverables:
    ➢ System and subsystem solution designs compliant with policy, business,
    security, operational and support requirements.
    ➢ Detailed system and subsystem technical, development, integration, interface
    and build documentation
    ➢ Functional and technical test plans, test cases and test results documentation
    ➢ Technical collateral for cost/benefit analysis and proposals
    ➢ Detailed root cause analysis documentation; Detailed Change Request
    technical analysis documentation; and Operational collateral
    7. Conduct systems integration and development of selected services, sub-services, and
    8. Create and maintain the following:
    ➢ Documentation: structured analysis and recommendations, weekly status
    reports, installation procedures, build books, maintenance procedures, business
    requirements analysis, network topologies, specifications and standards, design
    documentation, solution and implementation requests, support procedures,
    backup and restore procedures, etc.
    9. Deliver design and prototypes for the delivery of new service offerings.
    10. Identify the technical threats to, and vulnerabilities of networks and systems.
    11. Review, analyze, evaluate, and/or apply:
    ➢ Directory, authentication, and authorization protocols such as LDAP, Kerberos,
    SAML, OpenID Connect, or any future security authentication protocols
    ➢ Identity Management processes, best practices, standards, policies and
    supporting technologies
    ➢ Operating Systems such as Windows, Unix and Linux
    ➢ Networking Protocols such as HTTP, FTP, and Telnet
    ➢ Secure IT architectures fundamentals, standards, communications, and security
    protocols such as IPSec, IPv6, SSL, and SSH
    ➢ IT Security protocols at all layers of the Open Systems Interconnection (OSI)
    and Transmission Control
    ➢ Protocol/Internet Protocol (TCP/IP) stacks
    ➢ Domain Name Services (DNS), DHCP and Network Time Protocols (NTP)
    ➢ Network routers, multiplexers, and switches
    ➢ Application, host and/or Network hardening and security best practices such as
    shell scripting, service identification, and access control
    ➢ Intrusion detection/prevention systems (HIDS/HIPS), Network-based Intrusion
    Defence Systems, malicious code defence, file integrity, Enterprise Security
    Management, Security Information and Event Management (SIEM) Systems
    and/or firewalls
    ➢ Data Parsing
    ➢ Wireless technology
    ➢ Cryptographic Algorithms
    12. Manage the IT Security configuration.
    13. Monitor and develop reporting for system utilization and performance metrics.
    14. Perform lab testing to evaluate fixes, new features, and system interoperability.
    15. Prepare technical reports such as IT Security Solutions option analysis and
    implementation plans.
    16. Provide cross training and knowledge transfer to other support personnel.
    17. Provide engineering support through planning and implementing complex changes in
    large scale multi-tenant networked environments.
    18. Provide Independent Verification and Validation (IV&V) support to IT Security related
    19. Provide network security expertise on multi-disciplinary project teams to develop design
    20. Provide operational support for firewalls / VPNs / web content filtering infrastructure by
    performing change.
    21. Review perimeter security requirements and develop cost effective responses.
    22. Review, assess, develop alternatives, and recommendations for perimeter security
    approaches, technology, and processes.
    23. Provide expertise as well as design and implement solutions including Directory
    Technologies, Directory ETL systems, Authentication and Authorization Systems, Identity
    Management Systems, Credentials Management systems as well as business
    applications integrations.

    Note that the proposed resource may not be solely responsible for the completion of these
    deliverables. The consultant will be expected to work collaboratively with staff to ensure the work
    is completed in a way that ensures maximum knowledge transfer. 

    Maplesoft Group prides itself on its distinct corporate culture and recognizes that success is a direct reflection of our most valuable asset - our people.  Therefore, attitude and ambition are key personality traits we seek out, along with skill and aptitude, in potential employees.

    Maplesoft Group is committed to having a diverse, representative workforce and continuing to build an inclusive environment. We encourage applications from all qualified individuals. Maplesoft Group is an equal opportunity employer committed to diversity and inclusion. We are pleased to consider all qualified applicants irrespective of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veterans’ status, Aboriginal peoples or any other legally protected factors. 

    All employment decisions are made based on business needs, job requirements, and individual qualifications. 

    We are committed to developing inclusive, barrier-free recruitment and selection processes, and a work environment that supports our diverse workforce. Please let us know if you require accommodations at any stage of the recruitment process. We can be reached at Maplesoft Info at

    We thank you for your interest in Maplesoft Group and wish to advise you, that only candidates under consideration will be contacted.



    Are you interested in a career with Maplesoft Group? Please see our Career Opportunities page!