This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Cybersecurity Analyst will help lead the CMMC compliance efforts to enable pursuit of new GM Defense and other U.S. Government–regulated programs. This role works with cross‑functional teams to execute and assess control implementation, collect and validate audit‑ready evidence, and prepare artifacts for external assessments. The analyst works with the GMD GRC team and leads IT, program management, cloud, and engineering teams to ensure compliance with CMMC, NIST SP 800‑171, DFARS, FAR, and DoD cybersecurity requirements supporting government contracts. The ideal candidate combines strong understanding of security frameworks combined with technical security depth (on-prem + cloud) to manage evidence collection and remediation across multiple internal teams and is capable of obtaining security clearance.
Job Responsibility:
Drive the overall governance for government programs
Execute annual self-assessments (Continuous Monitoring) on CMMC/NIST controls and document findings
Coordinate internal teams (IAM, cloud, infrastructure, SOC, endpoint, vulnerability management, application owners) to validate control implementation and operational effectiveness
Identify compliance gaps, manage security exceptions (POA&Ms), and drive remediation prior to audit or customer assessments
Lead CMMC readiness and sustainment activities for GM Defense programs, aligned to NIST SP 800‑171 and DoD expectations for CUI protection
Build and maintain assessment‑ready evidence packages (policies, procedures, configurations, logs, tickets, reports) aligned to CMMC and DFARS requirements
Requirements:
Bachelor’s degree in Cybersecurity, Information Systems, Computer Science, or equivalent practical experience
5+ years of cybersecurity experience in regulated or government‑contract environments
Experience preparing for third‑party or government assessments
Ability to translate and communicate DoD cybersecurity requirements for application teams
Knowledge in the following areas: Identity & Access Management (IAM): RBAC, least privilege, privileged access workflows, MFA, service accounts, access reviews, joiner/mover/leaver processes
Windows & Linux security: GPO/Intune or equivalent, local admin controls, secure baselines (e.g., CIS-aligned), logging configuration, patch management, hardening validation
SIEM/logging: ability to define log requirements, validate ingestion/retention, produce audit-ready log evidence, and explain detections and response workflows
Practical experience with the following: Working knowledge of FAR and DFARS cybersecurity clauses, including contractor responsibilities for safeguarding CUI and incident reporting
Understanding of government system authorization concepts, shared responsibility models, and secure enclave design
Experience supporting cybersecurity requirements within defense programs, manufacturing, engineering, or supply‑chain environments
Experience with secure enclave design, CUI boundary segmentation, or regulated environments in automotive/manufacturing/supply chain contexts
Nice to have:
Cloud Security (AWS/Azure/GCP—at least one strongly preferred)