Compliance Engineer

  1. Home
  2. Remote jobs
  3. Audit
  • Company CyberSheath
  • Employment Full-time
  • Location 🇺🇸 United States nationwide
  • Submitted Posted 1 day ago - Updated 8 hours ago
<p><span data-contrast="auto">CyberSheath&nbsp;Services International LLC is a rapidly growing Managed Services Provider primarily focused on providing CMMC Compliance and Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add to our team!</span><span data-contrast="auto"> </span><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><p><span data-contrast="auto">CyberSheath&nbsp;integrates compliance and threat mitigation efforts and&nbsp;eliminates&nbsp;redundant security practices that&nbsp;don’t&nbsp;improve and, in fact, may weaken an organization’s security posture. Our professionals&nbsp;advise clients where to&nbsp;stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security.</span><span data-contrast="auto">  </span><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><p><span data-contrast="auto">Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Confident, ‘doers’ who ‘get the job done’ and strive to ‘do the right thing, even when no one is looking’ are the types of candidates who thrive in our culture.</span><span data-contrast="auto"> </span><span data-contrast="auto">&nbsp;Additionally, our most successful team members are self-starters and willing to put on many hats to succeed.&nbsp;CyberSheath&nbsp;is fast-growing and seeks candidates who want to be part of our upward trajectory.</span><span data-contrast="auto"> </span><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><p><span data-contrast="auto">We are seeking a&nbsp;</span><strong><span data-contrast="auto">Compliance Engineer</span></strong><span data-contrast="auto">&nbsp;who will&nbsp;be responsible for&nbsp;implementing and&nbsp;maintaining&nbsp;the technical security controls required under the Cybersecurity Maturity Model Certification (CMMC). This individual will work in close partnership with our dedicated compliance team to ensure that our organization and our clients adhere to all relevant standards, frameworks, and best practices. </span><span data-ccp-props="{}">&nbsp;</span></p><p><span data-contrast="auto">As the CMMC Compliance-Focused Engineer, you will be both a strategic partner and a hands-on contributor—collecting evidence of compliant work, configuring IT/security systems, and guiding internal teams on best practices. You will also&nbsp;interface directly with&nbsp;our clients, supporting formal CMMC audits and providing expert input on technical compliance measures. </span><span data-ccp-props="{}">&nbsp;</span></p><p><strong><span data-contrast="auto">Key Responsibilities</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><p><strong><span data-contrast="auto">CMMC Implementation &amp; Maintenance</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Implement, configure, and&nbsp;maintain&nbsp;security controls in line with CMMC requirements (e.g., GPOs, M365 tenant hardening, Intune, Conditional Access, Defender for Endpoint, SIEM). </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Collaborate with internal and external stakeholders to ensure ongoing compliance with CMMC standards. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Serve as the internal subject matter expert on CMMC-related technical questions and processes. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Technical Configuration &amp; Operations</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Design and deploy secure configurations for Microsoft 365, Azure, Azure Virtual Desktop, and the Microsoft Defender XDR suite. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Manage security baselines, conditional access policies, and monitoring/alerting configurations. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Coordinate with IT operations and security teams to remediate vulnerabilities and align with compliance&nbsp;objectives. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Hands-On Infrastructure &amp; Security Tools</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Utilize Active Directory, firewalls, and related security or network tools to ensure compliance and gather logs/artifacts as evidence. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Demonstrate the ability to log in, review configurations, and interpret outputs (e.g., system events, access logs,&nbsp;firewall&nbsp;logs) to support compliance documentation. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Work with cross-functional teams to update and&nbsp;maintain&nbsp;security configurations that align with CMMC requirements. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Compliance Evidence &amp; Artifact Collection</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Gather, document, and&nbsp;maintain&nbsp;the artifacts necessary to&nbsp;demonstrate&nbsp;compliance (system configurations, implementation records, access control logs, and related evidence). </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Collaborate with cross-functional teams (IT, Security, DevOps) to&nbsp;validate&nbsp;and record operational and security processes in compliance with CMMC. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Audit Support &amp; Client Engagement</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Provide expert guidance and support during client-facing CMMC audits, which may include up to 25% travel. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="13" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Communicate technical aspects of CMMC controls and remediation strategies clearly to both technical and non-technical audiences. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Represent the organization’s CMMC posture to external auditors, clients, and partners. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Flexible Schedule &amp; After-Hours Work</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Execute security or IT controls that must take place outside standard business hours (e.g., evenings or weekends) to minimize disruption to production environments. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Coordinate with relevant teams to schedule and perform critical updates or implementations that require off-peak windows. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Document changes, communicate outcomes, and ensure smooth transitions back to normal operations. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Continuous Improvement &amp; Collaboration</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Stay current on emerging threats, security trends, and CMMC updates; integrate these insights into ongoing compliance efforts. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Work closely with the dedicated compliance function to define, refine, and improve internal processes that align with CMMC requirements. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="20" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Identify&nbsp;opportunities to streamline technical controls, automate evidence collection, and enhance security posture. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Qualifications &amp; Skills</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><p><strong><span data-contrast="auto">Required Experience:</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Proven experience (3–5+ years) in implementing and managing technical security controls in Microsoft-focused environments. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="23" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Hands-on experience with: </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li><ul><li data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><strong><span data-contrast="auto">Microsoft 365 Administration &amp; Security</span></strong><span data-contrast="auto">&nbsp;(tenant hardening, identity &amp; access management, conditional access) </span><span data-ccp-props="{}">&nbsp;</span></li></ul></li></ul><ul><li><ul><li data-leveltext="" data-font="Symbol" data-listid="25" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><strong><span data-contrast="auto">Azure &amp; Azure Virtual Desktop</span></strong><span data-contrast="auto">&nbsp;(security configuration, monitoring, role-based access control) </span><span data-ccp-props="{}">&nbsp;</span></li></ul></li></ul><ul><li><ul><li data-leveltext="" data-font="Symbol" data-listid="26" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><strong><span data-contrast="auto">Microsoft Defender XDR Suite</span></strong><span data-contrast="auto">&nbsp;(Defender for Endpoint, Defender for Office 365, etc.) </span><span data-ccp-props="{}">&nbsp;</span></li></ul></li></ul><ul><li><ul><li data-leveltext="" data-font="Symbol" data-listid="27" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><strong><span data-contrast="auto">Group Policy Objects (GPOs)</span></strong><span data-contrast="auto">&nbsp;and&nbsp;</span><strong><span data-contrast="auto">Intune</span></strong><span data-contrast="auto">&nbsp;for device and application management </span><span data-ccp-props="{}">&nbsp;</span></li></ul></li></ul><ul><li><ul><li data-leveltext="" data-font="Symbol" data-listid="28" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><strong><span data-contrast="auto">Active Directory</span></strong><span data-contrast="auto">&nbsp;(managing user/groups, reviewing logs, applying group policies) </span><span data-ccp-props="{}">&nbsp;</span></li></ul></li></ul><ul><li><ul><li data-leveltext="" data-font="Symbol" data-listid="29" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><strong><span data-contrast="auto">Firewalls</span></strong><span data-contrast="auto">&nbsp;(configuring rules, reviewing logs, interpreting&nbsp;firewall&nbsp;outputs) </span><span data-ccp-props="{}">&nbsp;</span></li></ul></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="30" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Demonstrated&nbsp;track record&nbsp;of working with CMMC controls or similar regulatory/compliance frameworks (e.g., NIST 800-171, DFARS). </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="31" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Strong understanding of SIEM tools and security incident management workflows. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Technical &amp; Professional Skills:</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Excellent written and verbal communication skills, with the ability to present technical concepts to diverse audiences. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="34" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Proficiency&nbsp;in scripting or automating compliance evidence gathering (e.g., PowerShell) is a plus. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="35" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Strong organizational and project management skills, with an emphasis on attention to detail and follow-through. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="36" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Ability to work independently as well as collaboratively in a cross-functional team environment. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="37" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Willingness to work outside normal business hours when&nbsp;required. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Certifications (Preferred):</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="39" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Security+, CISSP, CISM, or similar professional security certifications. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="40" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Microsoft 365 and/or Azure certifications (e.g., MS-500, AZ-500)&nbsp;highly&nbsp;desirable. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="41" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Any CMMC-specific certifications or proven training credentials. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Soft Skills:</span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="43" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Customer-focused mindset and client-facing experience. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="44" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Ability to balance technical depth with broader compliance and business considerations. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><ul><li data-leveltext="" data-font="Symbol" data-listid="45" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Self-starter with a proactive approach to&nbsp;identifying&nbsp;and solving compliance challenges. </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><strong><span data-contrast="auto">Work Environment</span></strong><strong><span data-contrast="auto"> </span></strong><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><ul><li data-leveltext="" data-font="Symbol" data-listid="46" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">100% Remote work environment with occasional (25%) travel to client sites  </span><span data-ccp-props="{}">&nbsp;</span></li></ul><p><em><span data-contrast="auto">CyberSheath&nbsp;is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability.</span></em><em><span data-contrast="auto"> </span></em><span data-contrast="auto"> </span><span data-ccp-props="{}">&nbsp;</span></p><p><span data-ccp-props="{}">&nbsp;</span></p><div class="content-pay-transparency"><div class="pay-input"><div class="title">Budgeted Pay Range</div><div class="pay-range"><span>$100,000</span><span class="divider">&mdash;</span><span>$116,000 USD</span></div></div></div>

Loading similar jobs...

USA Remote Jobs

Discover fully remote job opportunities in the United States at USA Remote Jobs. Apply for roles like Software Developer, Customer Service Specialist, Project Manager, and more!

© 2026 Created by USA Remote Jobs. All rights reserved.