×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity​/Compliance Specialist; Tier 3

Job in Greensboro, Guilford County, North Carolina, 27497, USA
Listing for: NWS
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, Data Security, IT Consultant
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity / Compliance Specialist (Tier 3)

Overview

Cybersecurity / Compliance Specialist (Tier
3).

Location:

Hybrid (North Carolina).

Responsibilities
  • Cybersecurity Policy & Governance
    • Develop, maintain, and update enterprise cybersecurity policies, standards, procedures, and guidelines aligned with business operations and modernization initiatives.
    • Establish policies covering cloud security, application security, endpoint protection, identity and access management, and data protection.
    • Translate regulatory requirements and security frameworks into actionable internal controls and operating procedures.
    • Provide leadership with cybersecurity posture assessments, policy impact analysis, and risk insights.
  • Security Control Implementation & Validation
    • Implement and manage administrative, technical, and operational security controls across enterprise systems and platforms.
    • Support control implementation within cloud platforms, applications, endpoints, integrations, and identity systems.
    • Perform control testing, validation, and evidence collection to ensure controls are operating effectively.
    • Coordinate remediation activities for identified security gaps, vulnerabilities, and audit findings.
  • Cloud, Application, and Endpoint Security
    • Support secure configuration, monitoring, and access control for cloud-hosted environments.
    • Coordinate application security practices, including secure configuration, authentication, authorization, and vulnerability remediation.
    • Support endpoint security controls including device hardening, monitoring, and protection mechanisms.
    • Ensure consistent security baselines and configuration standards across environments.
  • Identity, Access, and Data Protection
    • Support identity and access management controls, including role-based access, least-privilege enforcement, and periodic access reviews.
    • Partner with data and IT teams to ensure sensitive data is appropriately classified, protected, and monitored.
    • Ensure encryption, logging, and monitoring controls are applied to systems handling critical business and customer data.
  • Compliance Coordination (e.g., SOC, CMMC, ISO 27001)
    • Coordinate cybersecurity compliance efforts across SOC 2, CMMC, ISO 27001, etc., and customer-driven security requirements.
    • Maintain compliance artifacts including policies, control mappings, evidence repositories, risk registers, and audit documentation.
    • Serve as a point of coordination with auditors, assessors, and internal stakeholders during readiness assessments and audits.
    • Track compliance milestones, remediation activities, and control ownership.
  • Risk Management & Security Operations Support
    • Conduct security and risk assessments across enterprise systems and business processes.
    • Support incident response activities, including investigation support, root cause analysis, and corrective action tracking.
    • Ensure logging, monitoring, and alerting mechanisms are operational and aligned to enterprise security objectives.
    • Maintain accurate security documentation, system inventories, and data flow diagrams.
  • Cross-Functional Collaboration
    • Partner with IT, Engineering, Data, and Operations teams to embed security into modernization initiatives.
    • Provide guidance to support secure adoption of new technologies, platforms, and services.
    • Contribute to cybersecurity awareness and secure-by-design practices across the organization.
  • Required Qualifications
    • Bachelor's degree in Cybersecurity, Information Systems, Computer Science, Engineering, or a related field.
    • 4-8+ years of experience in cybersecurity, information assurance, risk management, or security operations.
    • Experience developing cybersecurity policies and implementing security controls.
    • Hands-on experience supporting cloud, application, endpoint, identity, and data security controls.
    • Experience coordinating or supporting SOC 2, CMMC, ISO 27001, or similar compliance initiatives.
    • Ability to communicate security requirements clearly to technical and non-technical stakeholders.
    Preferred Qualifications
    • Experience in telecom, distribution, IT services, or technology-enabled environments.
    • Familiarity with modern security frameworks (e.g., Zero Trust, NIST, ISO) and risk-based security approaches.
    • Experience working with cloud platforms (Azure preferred)…
    To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
    (If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
     
     
     
    Search for further Jobs Here:
    (Try combinations for better Results! Or enter less keywords for broader Results)
    Location
    Increase/decrease your Search Radius (miles)

    Job Posting Language
    Employment Category
    Education (minimum level)
    Filters
    Education Level
    Experience Level (years)
    Posted in last:
    Salary