Leading security and compliance at Piedmont Global as a hands-on leader. Managing security vendors, maintaining certifications, and implementing frameworks.
Responsibilities
Serve as the primary administrator for Vanta.
You will manage continuous compliance monitoring daily, triage failing tests, automate evidence collection, and ensure our security posture remains audit-ready year-round.
Own the relationships with third-party security vendors.
You will hold vendors accountable to SLAs, ensure they deliver high-quality work, and conduct security reviews for new software procurement.
Serve as the primary point of contact for audits.
Maintain our ISO 27001 certification and lead the hands-on implementation for future compliance initiatives such as SOC 2 Type II and HITRUST.
Partner directly with Software Engineering and DevOps to configure cloud security controls in AWS, review Infrastructure as Code, and integrate security tools into the SDLC.
Manage day-to-day security operations, including vulnerability management, incident response, and access control reviews.
Act as a subject matter expert internal business units, helping them understand and navigate security requirements in government and healthcare contracts.
Partner closely with the IT Support team to design and validate secure configuration standards for laptops and mobile devices.
Requirements
5+ years of experience in Information Security, GRC, or Security Engineering.
Hands-on experience managing compliance automation platforms like Vanta is highly preferred.
Proven experience helping an organization achieve or maintain frameworks like ISO 27001 or SOC 2.
Strong technical background with exposure to cloud native environments, identity management, and modern SaaS platforms.
Experience managing external vendors or contractors and holding parties accountable for deliverables and quality.
You understand that security exists to support the business, not slow it down.
You are pragmatic and skilled at right-sizing controls that support business needs while maintaining compliance.
Exposure to Government (FedRAMP, CMMC) or Healthcare (HIPAA) compliance environments.
You’ve worked at software companies where security was mission critical.
You know what it looks like when security is a core part of the product offering.
CISO managing information security and privacy governance at Puzzel, a leading cloud - based contact center provider in Europe. Engaging with stakeholders for compliance and risk management.
Manager of IT Support & Endpoint Security overseeing service desk operations and endpoint security strategies. Leading a team to deliver high - quality technical support and manage IT security policies.
Senior Security Officer responsible for security and safety duties in acute care settings. Providing armed presence and response, coordinating with law enforcement as required.
Security Officer overseeing sensitive information protection and compliance with regulations. Collaborating with internal teams ensure security policy implementation and risk management under EU standards.
Technical consultant addressing information security risks for USAA and guiding strategic security direction. Leading peers in assessing security strategies and educating on best practices.
Technical Recruiter for BGS managing recruitment of Cybersecurity and IT professionals. Collaborating with technical teams to identify skill requirements and enhance talent acquisition processes.
Security and Privacy SME at Dynanet Corporation responsible for data management compliance and governance guardrails. Ensuring secure data handling and adherence to federal regulations.
PAM Manager responsible for strategy, roadmap, and operations of PAM program at Intact. Leading a team to safeguard privileged identities and secrets across various environments.
Senior Cybersecurity Vulnerability Management Versatilist at Boeing. Protecting the IT ecosystem by innovating vulnerability management solutions and leading security initiatives.
Entry level Associate Security Engineer at Navy Federal securing technical infrastructure and workloads with operational capabilities and threat monitoring practices.