Staff Security & Compliance Engineer- M365 GCCH/ CMMC

ServiceNowHuntsville, AL
2hRemote

About The Position

About the team: We are the backbone of Microsoft-powered collaboration at ServiceNow. Our team owns and manages the organization's Microsoft infrastructure — spanning Outlook, SharePoint, OneDrive, Microsoft Teams, and the broader collaboration ecosystem — ensuring employees have the tools, access, and experience they need to work seamlessly. Beyond keeping the lights on, we take a strong stance on security and governance within the Microsoft environment. From access controls and data policies to compliance frameworks, we ensure our collaboration platforms are not just productive — but safe, compliant, and built to scale. Whether it's enabling the workforce through modern collaboration tools or safeguarding the integrity of our Microsoft ecosystem, the DT Collaboration team sits at the intersection of productivity and trust. About the role: We are seeking a senior individual contributor to lead the technical design, implementation, and ongoing security operations of a Microsoft 365 GCC High environment supporting Controlled Unclassified Information (CUI). This role is accountable for implementing and evidencing compliance with CMMC Level 2, DFARS 7012, and NIST 800-171 controls. The engineer will act as the technical owner of the GCC High enclave, partnering with Security, Legal, and IT to ensure audit readiness and successful certification by May 2026. This role requires independent execution, deep security expertise, and the ability to translate regulatory requirements into enforceable technical controls. The impact you'll make: Architecture & Tenant Build Lead GCC High tenant design and deployment Define secure architecture for: Entra ID (Azure AD) Exchange Online SharePoint/OneDrive Teams Intune Defender Suite Purview Compliance Establish Zero Trust and least-privilege administrative model Design CUI boundary protections and data segmentation Compliance Implementation (CMMC/NIST 800-171) Map CMMC practices to technical controls and configurations Develop and maintain: System Security Plan (SSP) Control narratives Evidence repository POA&M Implement: MFA/Conditional Access Device compliance & endpoint hardening Logging/monitoring/SIEM integration DLP & data classification Incident response workflows Lead readiness reviews and assessment preparation with C3PAOs Security Operations Own security baselines and tenant hardening Manage vulnerability remediation lifecycle Oversee incident investigations and root cause analysis Establish monitoring, alerting, and audit logging standards Drive continuous improvement of controls Cross-Functional Leadership (IC4 Scope) Serve as technical authority for GCC High security decisions Provide guidance to operations engineers and offshore support Partner with Legal/Compliance on regulatory interpretation Present risk posture and compliance metrics to leadership Mentor junior engineers (without direct management responsibility)

Requirements

  • U.S. Person (citizen or permanent resident) – required for GCC High/CUI access.
  • 6–10+ years Microsoft 365/Azure security engineering experience.
  • Hands-on implementation of GCC High or FedRAMP/DoD environments.
  • Direct experience with: CMMC or NIST 800-171 control implementation, Intune & endpoint security, Entra ID Conditional Access/PIM, Defender suite, and Purview (DLP/eDiscovery/Insider Risk)
  • Experience preparing for security audits or assessments.
  • Strong technical documentation skills.

Nice To Haves

  • CISSP, CISM, or Security+
  • Microsoft SC-100, SC-200, SC-300, MS-102
  • Gov/DoD contracting environment experience

Responsibilities

  • Lead GCC High tenant design and deployment
  • Define secure architecture for Entra ID (Azure AD), Exchange Online, SharePoint/OneDrive, Teams, Intune, Defender Suite, and Purview Compliance
  • Establish Zero Trust and least-privilege administrative model
  • Design CUI boundary protections and data segmentation
  • Map CMMC practices to technical controls and configurations
  • Develop and maintain System Security Plan (SSP), Control narratives, Evidence repository, and POA&M
  • Implement MFA/Conditional Access, Device compliance & endpoint hardening, Logging/monitoring/SIEM integration, DLP & data classification, and Incident response workflows
  • Lead readiness reviews and assessment preparation with C3PAOs
  • Own security baselines and tenant hardening
  • Manage vulnerability remediation lifecycle
  • Oversee incident investigations and root cause analysis
  • Establish monitoring, alerting, and audit logging standards
  • Drive continuous improvement of controls
  • Serve as technical authority for GCC High security decisions
  • Provide guidance to operations engineers and offshore support
  • Partner with Legal/Compliance on regulatory interpretation
  • Present risk posture and compliance metrics to leadership
  • Mentor junior engineers (without direct management responsibility)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service