Something like this extremely long one-liner might work, if I understand your use case correctly.
(Get-NcCifsShare | select Vserver,Path) | where path -notlike "/" | % {Get-NcFileDirectorySecurity -Path $_.Path -VserverContext $_.Vserver | where SecurityStyle -eq "ntfs"}
1. Get listing of all CIFS shares for a given cluster, selecting the Vserver and Path properties, excluding the root shares.
2. Loop through results to collect NTFS security information with Get-NcFileDirectorySecurity, selecting only volumes with an NTFS security style.
You'll get output like this for each CIFS share path:
NcController : lab-clst-01
SecurityStyle : ntfs
EffectiveStyle : ntfs
DosAttributes : 16
DosAttributesText : ----D---
DosAttributesExpanded :
UnixUserId : 0
UnixGroupId : 0
UnixModeBits : 777
Acls : {NTFS Security Descriptor, Control:0x8004, Owner:BUILTIN\Administrators,
Group:BUILTIN\Administrators...}
Inode : 64
Path : /testing
You could filter the data further if you only care about certain fields (the ACLs themselves, and the path - for example) but that should give you a good start at least.
Donny