Cybersecurity - Exposure Management Analyst
Listed on 2026-03-13
-
IT/Tech
Cybersecurity
Cybersecurity - Exposure Management Analyst Locations:
Birmingham, AL. or Atlanta, GA.
Onsite 4 days per week.
At Southern Company, our core objective is to ensure safe and reliable computing environment for the consumers of our services, both internally and externally. Our complex environment generates a constant stream of challenges which require continual innovation with an evolving set of technologies. Keeping the network safe and reliable ensures that our users stay connected with our applications, products and services.
Southern Company is committed to supporting the professional development and growth of its employees and fosters an environment of diversity, equity, and inclusion.
Southern Company is seeking a passionate and experienced Exposure Management Analyst to join our Cybersecurity organization. This is a technical, hands‑on role that requires the ability to assess exposures, analyze risks, and advise strategies to mitigate exposure. This role will support day‑to‑day continuous threat and exposure management operations focused on identifying and escalating exposed risks. Work outputs will support implementation of security technologies and controls to improve defensive posture, implementation of processes in support of investigations, and development of detection capabilities.
Qualifications:- Bachelor’s degree in computer science, technology, engineering or security-related field or equivalent experience
- Minimum 5 years IT or security experience
- Demonstrated expertise in supporting vulnerability and patch management programs, enhancing application security, and conducting thorough analyses of potential exposures
- Experience working with vulnerability scanning, attack surface management, and cloud security posture management tools
- Understanding of OWASP common vulnerabilities and testing methodologies
- Understanding of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross‑site scripting, code injection, race conditions, covert channel, replay, return‑oriented attacks)
- Understanding and familiarity with different operating systems (e.g., Windows and LINUX/UNIX systems)
- Knowledge of IT security / hardening best practices; including but not limited to operating systems, web applications, and network devices.
- Experience building interactive dashboards and reports in Power
BI to visualize security metrics and exposure management data, including remediation progress, risk exposure, etc. - Proficient in Microsoft Excel, including advanced functions such as Pivot Tables, VLOOKUP, and data analysis tools to organize, summarize, and interpret complex datasets.
- Experience using a SIEM to run search queries, perform log analysis, and build dashboards to monitor potential exposures
- Ability to effectively organize tasks, manage multiple priorities/details, meet schedules, and deliver on commitments
- Ability to thrive in a fast‑paced environment, demonstrating adaptability and flexibility in response to changing priorities and emerging threats.
- Experience driving discussions and consensus across a broad group of stakeholders and cross functional teams regarding patching, security recommendations, and mitigations strategies
- Strong verbal and written communication skills, with the ability to work independently and collaboratively within a team. Proven experience interacting with both technical and non‑technical stakeholders.
- Support day‑to‑day operations of the exposure management program, including data review, report processing, and trend analysis. Track remediation of identified risks and mitigation strategies and elevate findings to key stakeholders.
- Ability to analyze potential security risks and determine applicability to our environment
- Execute emergency vulnerability workflows and procedures
- Stay informed about publicly disclosed vulnerabilities (CVEs) and potential vulnerabilities (rumors, blogs, partial public analysis).
- Map vulnerability assessment results to asset inventory and key stakeholders. Calculate prioritization based on risk assessment.
- Identify and recommend appropriate compensating controls to manage and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).