SCS Technology Security
IT Security Analyst, Special/Senior
Threat and Vulnerability Analyst
Job Description
At Southern Company, our core objective is to ensure safe and reliable computing environment for the consumers of our services, both internally and externally. Our complex environment generates a constant stream of challenges which require continual innovation with an evolving set of technologies. Keeping the network safe and reliable ensures that our users stay connected with our applications, products and services. Southern Company is committed to supporting the professional development and growth of its employees and fosters an environment of diversity, equity, and inclusion.
Position Overview:
Southern Company is seeking a passionate and experienced Team Lead for our Vulnerability Management Program. This is a technical, hands-on role that requires the ability to assess threats, analyze risks and advise strategies to mitigate exposure.
This position is responsible for leading and conducting day-to-day continuous vulnerability management operations and attack surface assessments focused on identifying exposed risks. Work outputs will support implementation of security technologies and controls to improve defensive posture, implementation of processes in support of investigations, and development of detection capabilities.
The ideal candidate will have a have a background in vulnerability management or patch management, be well versed in risk assessments, and have experience working with cross functional teams to build consensus.
Qualifications:
- Bachelor’s degree in computer science, technology, engineering or security-related field or equivalent experience
- Minimum 7 years IT or security experience
- Previous experience supporting vulnerability or patch management programs
- Experience working with vulnerability scanning tools
- Understanding of OWASP common vulnerabilities and testing methodologies
- Understanding of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, code injection, race conditions, covert channel, replay, return-oriented attacks)
- Understanding and familiarity with different operating systems (e.g., Windows and LINUX/UNIX systems)
- Knowledge of IT security / hardening best practices; including but not limited to operating systems, web applications, and network devices.
- Ability to effectively organize tasks, manage multiple priorities/details, meet schedules, and deliver on commitments
- Experience driving discussions and consensus across a broad group of stakeholders and cross functional teams regarding patching, security recommendations, and mitigations strategies
- Solid verbal and written communication skills required
- Strong interpersonal skills and experience interacting with technical and non-technical stakeholders
- Ability to work independently and with a team
Job Responsibilities:
- Lead day-to-day operations of the vulnerability management program, including reviewing data, processing reports, escalating findings to key stakeholders, tracking remediation of identified risks and mitigation strategies, assessing mitigation plan dependences, and analyzing trends
- Drive execution of zero-day workflows and procedures
- Maintain knowledge of the current security threat landscape by monitoring related internet postings, intelligence reports and other sector specific sources as necessary
- Maintain awareness of latest available exploits and feasibility to create an exploit
- Maintain awareness of publicly disclosed vulnerabilities (CVEs) and potential vulnerabilities (rumors, blogs, partial public analysis).
- Map vulnerability assessment results to asset inventory and key stakeholders
- Calculate prioritization based on assessment of risk
- Identify and recommend appropriate measures to manage and remediate vulnerability risk with the focus on reducing potential impacts
- Support development of vulnerability metrics and remediation-related dashboards and reports
- Understand enterprise policies and advise policies and technical standards with specific regard to vulnerability management, scanning procedures and secure configuration
- Coordinate with key business partners to understand, prioritize, and coordinate vulnerability remediation activities
- Collaborate with peers from across the organization and maintain excellent working relationships with key partners across Technology Organization functions and business partners
- Understand business requirements and work with business partners to define appropriate solutions, meeting both security mandates and business needs
- Demonstrate Southern Company values of Safety First, Unquestionable Trust, Superior Performance, and Total Commitment
Job Requirements:
- Must be willing and able to obtain and maintain US government security clearance
- Required to submit to a thorough background examination
- Ability to understand business requirements and present appropriate solutions
- Ability to work independently or within a team
- Demonstrated critical, independent thinking; demonstrated ability to conceive and present creative solutions
- Must pass NERC CIP & Insider Threat Protection background checks
- One or more relevant industry certifications (GSEC, CISSP, GCIA, GMON, GCFA, GCFE, GREM, CEH, OSCP)
- Occasional travel to local and regional locations in pursuit of job duties and requirements