Careers

Why be a part of Maplesoft Group?

Maplesoft implements TimeLive for Electronic time tracking.

Please view the demo below on how to enter and approve time.

Watch Video - TimeLive - Timesheet Entry Demo
Watch Video - TimeLive - Timesheet Approval Demo

Do you want to work in a dynamic environment where your contributions count?

At Maplesoft, we value the contributions of all our employees and contractors. We listen and act upon suggestions, advice, and innovative ideas to further our strategic vision. In turn, Maplesoft contributes to the communities where we live and operate. We think globally, but act in our own backyards.

Build your future with Maplesoft’s exciting technologies, deep partnerships, personal approach to consulting services, professional development opportunities and exciting company culture.

To be considered for new opportunities please send us your resume at info@maplesoftgroup.com

Loading


  • Filename
    Status
    Size

    Back
    Title Information Technology Security Design Specialist
    Location Gatineau, QC
    Start Date 01-11-2024
    Language Bilingualism in both official languages (English and French)
    Salary Negotiable
    Security Clearance Enhanced Reliability
    Duration 2 Months
    Date Posted 01-11-2024
    Job ID 13181
    Recruiter Email

    Maplesoft Group is currently seeking an Information Technology Security Design Specialist for our Federal Government client.


    The following responsibilities are associated with the “Statement of Work” but are not limited to:

    1. Review, analyze, and/or apply Federal IT Security policies, System IT Security Certification &
    Accreditation processes, IT Security products, safeguards and best practices, and the IT Security
    risk mitigation strategies;
    2. Identify threats to, and vulnerabilities of operating systems and wireless architectures (Azure
    and MS Power Platform);
    3. Identify personnel, technical, physical, and procedural threats to and vulnerabilities of Federal
    IT systems;
    4. Develop reports such as: Data security analysis, Concepts of operation, Statements of
    Sensitivity (SoSs), Threat assessments, Privacy Impact Assessments (PIAs), Non-technical
    Vulnerability Assessments, Risk assessments, IT Security threat, vulnerability and/or risk
    briefings;
    5. Conduct Certification activities such as: Develop Security Certification Plans, Verify that
    security safeguards meet the applicable policies and standards, validate the security
    requirements by mapping the system-specific security policy to the functional security
    requirements, and mapping the security requirements through the various stages of design
    documents, Verify that security safeguards have been implemented correctly and that
    assurance requirement have been met. This includes confirming that the system has been
    properly configured, and establishing that the safeguards meet applicable standards, Conduct
    security testing and evaluation (ST&E) to determine if the technical safeguards are functioning
    correctly, Assess the residual risk provided by the risk assessment to determine if it meets an
    acceptable level of risk;
    6. Conduct Accreditation activities such as: Review of the certification results in the design review
    documentation by the Accreditation Authority to ensure that the system will operate with an
    acceptable level of risk and that it will comply with the departmental and system security
    policies and standards and identify the conditions under which a system is to operate (for
    approval purposes).
    This may include the following types of approvals;
    7. Developmental approval by both the Operational and the Accreditation Authorities to proceed
    to the next stage in an IT system's life cycle development if sensitive information is to be
    handled by the system during development;
    8. Operational written approval for the implemented IT system to operate and process sensitive
    information if the risk of operating the system is deemed acceptable, and if the system is in
    compliance with applicable security policies and standards;
    9. Interim approval - a temporary written approval to process sensitive information under a set of
    extenuating circumstances where the risk is not yet acceptable, but there is an operational
    necessity for the system under development; and
    10. Develop and deliver training material relevant to the resource category.

     
    Maplesoft Group prides itself on its distinct corporate culture and recognizes that success is a direct reflection of our most valuable asset - our people.  Therefore, attitude and ambition are key personality traits we seek out, along with skill and aptitude, in potential employees.

    Maplesoft Group is committed to having a diverse, representative workforce and continuing to build an inclusive environment. We encourage applications from all qualified individuals. Maplesoft Group is an equal opportunity employer committed to diversity and inclusion. We are pleased to consider all qualified applicants irrespective of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veterans’ status, Aboriginal peoples or any other legally protected factors. 

    All employment decisions are made based on business needs, job requirements, and individual qualifications. 

    We are committed to developing inclusive, barrier-free recruitment and selection processes, and a work environment that supports our diverse workforce. Please let us know if you require accommodations at any stage of the recruitment process. We can be reached at Maplesoft Info at info@maplesoftgroup.com.

    We thank you for your interest in Maplesoft Group and wish to advise you, that only candidates under consideration will be contacted.

    Are you interested in a career with Maplesoft Group? Please see our Career Opportunities page!


    SEE CAREER OPPORTUNITIES