Skip to Main Content

Job Title


Offensive Security Lead - Penetration Testing


Company : RSM Canada


Location : toronto, Ontario


Created : 2026-03-19


Job Type : Full Time


Job Description

We are currently looking for team members to join our Security, Privacy, and Risk Consulting practice. The candidate will work with teams of security and privacy staff in a wide variety of systems environments. Our Security, Privacy and Risk Consulting team serves the Information Security and Data Privacy related needs of our clients. This team helps organizations identify their cyber risk, and design and implement program to address those risks and improve their cyber security posture. We serve a diverse base of clients in a variety of industries and understanding how technology impacts the operation and growth of organizations is what we do best. We are seeking individuals skilled at performing vulnerability assessments, penetration testing, and secure architecture reviews of a variety of operating systems, network devices, wireless solutions, and their related infrastructure.Examples of candidate's responsibilities include:Perform analysis and testing to verify the strengths and weaknesses of client IT environments utilizing commercial and open source security testing toolsPerform Internet penetration testing (blackbox/greybox /whitebox testing) and network architecture reviews (manual/automated)Perform other security testing tasks such as wireless penetration testing, social engineering campaigns (email, web, phone, physical, etc.), mobile application testing, embedded device testing, and similar activities meant to identify critical weaknesses within client environmentsAssist with the development of remediation recommendations for identified findingsIdentify and clearly articulate (written and verbal) findings to senior management and clientsHelp identify improvement opportunities for assigned clientsSupervise and provide engagement management for other staff working on assigned engagementsRequired Qualifications:This position is for individuals with 4+ years of experience within the cyber security space, with a preference for prior consulting or professional services backgrounds. Other candidates may be considered based on experience and skill sets.Ability to travel as neededMust possess a high degree of integrity and confidentiality, as well as the ability to adhere to both company policies and best practicesStrong verbal and written abilitiesStrong multitasking and project management skillsPreferred Qualifications:Bachelor's degree in computer science or related field from an accredited college/universityTechnical background in networking/system administration, security testing or related fieldsIn-depth knowledge of TCP/IPTwo or more years of Perl, Python, Bash, or C experienceOperating System Configuration and Security experience (Windows, HP-UX, Linux, Solaris, AIX, etc.)Configuration and Security experience with firewalls, switches, routers, VPNsExperience with security and architecture testing and development frameworks, such as the Open WebApplication Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115Familiar with security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box)Experience with discovering, utilizing, and possibly writing exploits for such vulnerabilities as buffer and stack overflowsFamiliar with the logistics of security testing such as acquiring authorization for testing, reporting, risk analysis of findings, data handling, and legal considerationsCommercial Application Security tools experience (Nessus, Nexpose, Qualys, Appdetective, Appscan, etc.)Open source and free tools experience (Kali Linux suite, Metasploit, nmap, airsnort, Wireshark, Burp Suite, Paros, etc.)One or more of the following testing certifications: Certified Ethical Hacker (CEH); GIAC Certified Penetration Tester (GPEN); Offensive Security Certified Professional (OSCP); or equivalent development or testing certification (ECSA, CEPT, CPTE, CPTS, etc)In addition, one or more of the following governance certifications is preferred: Certified Information Systems Security Professionals (CISSP); Certified Information Systems Auditor (CISA); Certified Information Security Manager (CISM)Strong leadership and communication skills, technical knowledge, and the ability to write at a 'publication' quality level in order to communicate findings and recommendations to the client's senior management