We’re seeking a detail‑driven Compliance Program Manager to lead the SOC initiatives and strengthen our security and governance practices. This role is ideal for someone who thrives in structured environments, enjoys cross‑functional collaboration, and has hands-on experience driving compliance programs from planning to audit completion.
Key Responsibilities
- Oversee the full lifecycle of SOC efforts, from initial readiness evaluations to evidence preparation and audit engagement.
- Build and refine processes that support continuous monitoring, control tracking, and ongoing compliance health.
- Work closely with engineering, IT, and security partners to ensure SOC controls are properly designed, implemented, and maintained across our technology stack.
- Identify requirements for tooling, automation, and workflow improvements to simplify evidence collection and reporting.
- Serve as the primary liaison with auditors and customer stakeholders throughout the audit cycle.
Required Qualifications
Bachelor’s degree with at least 5 years of experience in technical program management, compliance, security operations, or a related discipline.Minimum of 2 years managing SOC or equivalent compliance frameworks.Proven success coordinating cross‑departmental compliance or audit projects.Preferred Qualifications
4+ years supporting SOC audits and working with security frameworks such as ISO 27001, CMMC, or NIST 800‑171.Strong understanding of technical security concepts, including network and system architecture.Background in managing audits end‑to‑end, including evidence governance and control validation.Industry certifications such as CISSP, CISA, or CISM are a plus.Core Competencies
Strong command of the AICPA Trust Services Criteria (Security, Availability, Confidentiality, Processing Integrity, and Privacy).Ability to evaluate operational and security risks and determine mitigation strategies.Experience conducting readiness reviews, partnering with audit firms, addressing findings, and ensuring the completeness and accuracy of evidence.Understanding of monitoring, logging, and incident response practices relevant to SOC operational controls.