Cybersecurity/Compliance Specialist; Tier 3
Job in
Greensboro, Guilford County, North Carolina, 27497, USA
Listed on 2026-02-16
Listing for:
NWS
Full Time
position Listed on 2026-02-16
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, Data Security, IT Consultant
Job Description & How to Apply Below
Overview
Cybersecurity / Compliance Specialist (Tier
3).
Location:
Hybrid (North Carolina).
- Develop, maintain, and update enterprise cybersecurity policies, standards, procedures, and guidelines aligned with business operations and modernization initiatives.
- Establish policies covering cloud security, application security, endpoint protection, identity and access management, and data protection.
- Translate regulatory requirements and security frameworks into actionable internal controls and operating procedures.
- Provide leadership with cybersecurity posture assessments, policy impact analysis, and risk insights.
- Implement and manage administrative, technical, and operational security controls across enterprise systems and platforms.
- Support control implementation within cloud platforms, applications, endpoints, integrations, and identity systems.
- Perform control testing, validation, and evidence collection to ensure controls are operating effectively.
- Coordinate remediation activities for identified security gaps, vulnerabilities, and audit findings.
- Support secure configuration, monitoring, and access control for cloud-hosted environments.
- Coordinate application security practices, including secure configuration, authentication, authorization, and vulnerability remediation.
- Support endpoint security controls including device hardening, monitoring, and protection mechanisms.
- Ensure consistent security baselines and configuration standards across environments.
- Support identity and access management controls, including role-based access, least-privilege enforcement, and periodic access reviews.
- Partner with data and IT teams to ensure sensitive data is appropriately classified, protected, and monitored.
- Ensure encryption, logging, and monitoring controls are applied to systems handling critical business and customer data.
- Coordinate cybersecurity compliance efforts across SOC 2, CMMC, ISO 27001, etc., and customer-driven security requirements.
- Maintain compliance artifacts including policies, control mappings, evidence repositories, risk registers, and audit documentation.
- Serve as a point of coordination with auditors, assessors, and internal stakeholders during readiness assessments and audits.
- Track compliance milestones, remediation activities, and control ownership.
- Conduct security and risk assessments across enterprise systems and business processes.
- Support incident response activities, including investigation support, root cause analysis, and corrective action tracking.
- Ensure logging, monitoring, and alerting mechanisms are operational and aligned to enterprise security objectives.
- Maintain accurate security documentation, system inventories, and data flow diagrams.
- Partner with IT, Engineering, Data, and Operations teams to embed security into modernization initiatives.
- Provide guidance to support secure adoption of new technologies, platforms, and services.
- Contribute to cybersecurity awareness and secure-by-design practices across the organization.
- Bachelor's degree in Cybersecurity, Information Systems, Computer Science, Engineering, or a related field.
- 4-8+ years of experience in cybersecurity, information assurance, risk management, or security operations.
- Experience developing cybersecurity policies and implementing security controls.
- Hands-on experience supporting cloud, application, endpoint, identity, and data security controls.
- Experience coordinating or supporting SOC 2, CMMC, ISO 27001, or similar compliance initiatives.
- Ability to communicate security requirements clearly to technical and non-technical stakeholders.
- Experience in telecom, distribution, IT services, or technology-enabled environments.
- Familiarity with modern security frameworks (e.g., Zero Trust, NIST, ISO) and risk-based security approaches.
- Experience working with cloud platforms (Azure preferred)…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×