×
Register Here to Apply for Jobs or Post Jobs. X

Security Advisor Specialist, Offensive Security; Global Red Team

Job in Toronto, Ontario, M5A, Canada
Listing for: Intact Financial Corporation
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Position: Security Advisor Specialist, Offensive Security (Global Red Team)

About the role

The Security Specialist, Offensive Security is responsible for testing the security controls, the network, and threat response for Intact Financial globally (All regions and all affiliate companies). He/she works as a specialist employing techniques, tactics and protocols to test security controls, working as part of a global offensive security team.

The Specialist, Offensive Security reports to the Director, Offensive Security and works with a team of technical advisors across multiple locations and time zones.

If you can think outside of the Kali box, and love to think like an attacker (with a track record to prove your capabilities) we want to talk to you about joining our team!

What you'll do here:

  • Conduct reconnaissance on network environment to build external landscape using industry standard tools, threat intelligence feeds, OSINT and other readily available information sources

  • Conduct offensive security testing to ensure security controls and response actions are effective. If you are detected, shifting from a red team focus to a purple team approach – your purpose isn’t to create a “Gotcha!” moment – our mission is to strengthen our controls throughout the entire attack chain across the enterprise.

  • Employ attack strategies to simulate real-world attacks by threat actors and benchmark response capabilities across the enterprise.

  • Ability to identify and exploiting vulnerabilities in computer systems, networks and applications to simulate attacks by threat actors – you have a proven track record of evading modern EDR (eg. Crowdstrike, MDE, Sentinel One) while elevating privileges/hitting your target.

  • Analyze and report on the results of security assessments and make recommendations to improve the security posture of the enterprise.

  • You understand the TCP/IP stack in depth and know how to exploit it to create covert beacons, C2 channels, exfiltrate data across DNS. Understanding how routing tables work (eg. BGP) and how they can be exploited is an asset.

  • Work with regional cyber governance and risk teams to ensure that findings are properly tracked for remediation

  • Generate the required metrics and reports to support the CISO IFC Affiliates in reporting on enterprise security control effectiveness

  • Leverage industry standard and emerging tools to evaluate emerging threats to the financial services space and benchmark regions and affiliate companies to peers.

  • Able to consume threat intelligence and apply the attack surface to crown jewel assets for target and tactic development, proposing clear rules of engagement for testing activities (either one time or perpetual) and ensuring compliance to the ROE through all phases of testing.

  • Maintain and update all offensive security tools, technologies and processes in line with company rules of engagement

  • Provide timely and effective communications to key internal stakeholders in alignment with policy and rules of engagement.

  • What you bring to the table:

  • Advanced knowledge in the following areas: computer networks, operational security platforms, information security principles, TCP/IP, DNS, UDP, BGP, SOC, IAM, SIEM, DLP, EDR, Threat intelligence, Incident Response, technical writing, information risk.

  • Bachelor's degree in Computer Technology, Information Security, an asset.

  • A minimum of five (5) years of relevant professional experience in information technology.

  • A minimum of three (3) years of experience in information security.

  • Knowledge of offensive security operations, tools and techniques.

  • Knowledge of information security standards, regulations and legislation (NIST, COBIT5, ISO 27001), an asset.

  • Python scripting comes naturally, and have a history of using it in blue/red/purple team engagements

  • Proficiency in manual testing techniques beyond automated scanning.

  • Strong knowledge of OWASP Top 10, MITRE ATT&CK, and CVSS scoring.

  • You can take many vectors of technical vulnerability information (Pentest reports, vulnerability scanning data, SAST/DAST reports) and build an attack plan on critical assets.

  • You must have the ability to take highly technical data and results and translate them to business-friendly language to help non-technical stakeholders…

  • Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
    To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary