Network & Cybersecurity

Gastronomous Technologies Inc.Oakville, ON
Onsite

About The Position

Gastronomous Technologies is seeking an experienced Network & Cybersecurity contractor to assess, harden, and document their security posture. This is a hands-on, on-site role that will cover internal infrastructure, server environments, and embedded systems. The contractor will play a key role in the company's SOC 2 certification roadmap, anchoring the network and infrastructure security track. The role involves rigorous documentation alongside all deliverables.

Requirements

  • Minimum 7+ years of relevant Canadian-industry experience required.
  • Strong hands-on networking background, including firewall configuration, VLANs, routing, and network segmentation.
  • Proven penetration testing experience, specifically in infrastructure and/or embedded/IoT systems.
  • Familiarity with Linux server hardening, server cluster setup, and infrastructure automation.
  • Practical knowledge of SOC 2, NIST CSF, or equivalent frameworks.
  • Strong written documentation skills, including diagrams, reports, and runbooks.
  • Ability to work independently with minimal oversight.
  • Clear communication skills with non-technical leadership.

Nice To Haves

  • Experience with AWS Platform.
  • Experience with embedded Linux, IoT device security, or OT/ICS environments.

Responsibilities

  • Audit, redesign, and document network architecture, including segmentation, VLANs, and access controls.
  • Review firewall policies, tighten existing rules, eliminate unnecessary exposure, and document the final ruleset.
  • Configure and maintain VPN access for remote team members and contractors.
  • Implement and document network monitoring and alerting for anomalous traffic.
  • Lead the setup and configuration of new server clusters, including racking, OS hardening, services, and access controls.
  • Review, document, and strengthen backup configurations.
  • Manage patch cadence and system hardening across all servers and critical hosts.
  • Conduct penetration testing on internal infrastructure, identifying and remediating exploitable vulnerabilities.
  • Conduct or coordinate breach simulation exercises to validate detection and response capabilities.
  • Produce formal reports with findings, risk ratings, and remediation priorities for each assessment.
  • Drive the network and infrastructure security controls workstream for the SOC 2 readiness program.
  • Produce and maintain thorough documentation: network diagrams, firewall policies, configurations, incident response runbooks.
  • Advise on policy creation, including acceptable use, incident response, vulnerability management, and third-party access.

Benefits

  • Unique scope: internal corporate infra AND embedded hardware security in deployed commercial equipment
  • Greenfield opportunity to build things the right way from the ground up
  • Direct input into a SOC 2 program from day one
  • Small team, real authority — your recommendations get implemented
  • Potential opportunity to transition to full-time
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service