Hi @Skid,
This kind of setup really requires a good understanding of VLANs, how they work and how to configure them. I get the impression you are not so familiar? Go online, read up on access ports and trunk ports, tagged and untagged, VLAN IDs - different vendors vary the terminology a bit but it's all the same stuff!
I've just returned from doing a temporary event with a very similar setup - only five ADSL connections on the WAN side but they were dotted all over site and had to pass through multiple switches to get to the router (a pfsense VM on a DL380).
You need to define a few bits first:
1. Assign a VLAN ID to each WAN (eg. 51, 52 … 60).
2. Create untagged (access) ports on the cisco switch which connect to each modem.
3. Create a trunk (tagged) port on the cisco switch which passes all those VLAN IDs (ie. 51..60). Connect that port to you r pfsense router and configure each VLAN on it's own interface in pfsense.
4. Don't use DHCP of PPPoE on the WAN connections, I had major issues doing it this way when a connection went offline. Configure them all in their own subnets as you describe and set a static IP address for each WAN interface in pfsense.
5. Configure load balancing / traffic shaping in the pfsense router.
You also need to create and configure a LAN connection - ideally via a physically separate network port but this could be a VLAN too, of course you'll need a suitably sized subnet and DHCP scope to cope with the number of users.
What's your location? I might be happy to help you with this.