• View Jobs
  • Our Employer Partners
  • Post Job
  • Purchase
  • Employers
    • Job Board & Recruiting Buyers Guide
    • Register (Create Profile)
    • Login
  • Job Seekers
    • Register (Create Profile)
    • eNewsletter Archives
    • Post Resume
    • Coaching & Interview Prep
  • Blog/Articles
  • About MPN
    • Job Board & Recruiting Buyers Guide
    • mpnEmpowerED.com
    • mpnDiversityRecruiters.com
    • mpnCoaching.com
    • Clients & Results
    • Capability Statement
    • MPN Newsroom
    • Our CEO
  • Sign in
  • Sign up
  • View Jobs
  • Our Employer Partners
  • Post Job
  • Purchase
  • Employers
    • Job Board & Recruiting Buyers Guide
    • Register (Create Profile)
    • Login
  • Job Seekers
    • Register (Create Profile)
    • eNewsletter Archives
    • Post Resume
    • Coaching & Interview Prep
  • Blog/Articles
  • About MPN
    • Job Board & Recruiting Buyers Guide
    • mpnEmpowerED.com
    • mpnDiversityRecruiters.com
    • mpnCoaching.com
    • Clients & Results
    • Capability Statement
    • MPN Newsroom
    • Our CEO
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

select jobs found

Email me jobs like this
Refine Search
Current Search
it service management analyst unix linux
MPN Diversity Recruiters
Fortune 200 Cybersecurity Exposure Management Analyst
MPN Diversity Recruiters Atlanta, GA or Birmingham, AL
Our  Fortune 200 Company  client is seeking to  DIRECTLY HIRE  a  Cybersecurity Exposure Management Analyst  to join its Cybersecurity organization.  This position can be based in either Atlanta, GA or Birmingham, AL. CANDIDATE SUBMISSION REQUIREMENTS:   Please carefully read before applying. You can only be considered for referral to the hiring manager IF you meet ALL of the requirements below.   1) You must apply with a  SINGLE  document (in Word or PDF). This single merged document must include each of the Hiring Manager's  pre-screening questions  shown BELOW and your detailed responses (at the TOP) followed by your usual resume/CV content. 2) You must be  permanently  authorized to work in the U.S. WITHOUT requiring any current or future sponsorship. In a nutshell, you must be a U.S. citizen or current permanent resident (green) cardholder. 3) You must currently reside or self-relocate to be within commutable distance to  Atlanta, GA  or  Birmingham, AL . 4) You must be reasonably qualified and comply with ALL of the above requirements to receive consideration for an interview referral to the Hiring Manager for this role. In our Fortune 200 Company , our core objective is to ensure safe and reliable computing environment for the consumers of our services, both internally and externally. Our complex environment generates a constant stream of challenges which require continual innovation with an evolving set of technologies. Keeping the network safe and reliable ensures that our users stay connected with our applications, products and services. Our  Fortune 200 Company is committed to supporting the professional development and growth of its employees and fosters an environment of diversity, equity, and inclusion. Position Overview: Fortune 200 Company  is seeking a passionate and experienced Exposure Management Analyst to join our Cybersecurity organization . This is a technical, hands-on role that requires the ability to assess exposures, analyze risks, and advise strategies to mitigate exposure. This role will support day-to-day continuous threat and exposure management operations focused on identifying and escalating exposed risks. Work outputs will support implementation of security technologies and controls to improve defensive posture, implementation of processes in support of investigations, and development of detection capabilities.   Qualifications: Bachelor’s degree in computer science, technology, engineering or security-related field or equivalent experience Minimum 5 years IT or security experience Demonstrated expertise in supporting vulnerability and patch management programs, enhancing application security, and conducting thorough analyses of potential exposures Experience working with vulnerability scanning, attack surface management, and cloud security posture management tools Understanding of OWASP common vulnerabilities and testing methodologies Understanding of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, code injection, race conditions, covert channel, replay, return-oriented attacks) Understanding and familiarity with different operating systems (e.g., Windows and LINUX/UNIX systems) Knowledge of IT security / hardening best practices; including but not limited to operating systems, web applications, and network devices. Experience building interactive dashboards and reports in PowerBI to visualize security metrics and exposure management data, including remediation progress, risk exposure, etc. Proficient in Microsoft Excel, including advanced functions such as PivotTables, VLOOKUP, and data analysis tools to organize, summarize, and interpret complex datasets. Experience using a SIEM to run search queries, perform log analysis, and build dashboards to monitor potential exposures Ability to effectively organize tasks, manage multiple priorities/details, meet schedules, and deliver on commitments Ability to thrive in a fast-paced environment, demonstrating adaptability and flexibility in response to changing priorities and emerging threats. Experience driving discussions and consensus across a broad group of stakeholders and cross functional teams regarding patching, security recommendations, and mitigations strategies Strong verbal and written communication skills, with the ability to work independently and collaboratively within a team. Proven experience interacting with both technical and non-technical stakeholders.   Job Responsibilities:    Support day-to-day operations of the exposure management program, including data review, report processing, and trend analysis. Track remediation of identified risks and mitigation strategies and escalate findings to key stakeholders. Ability to analyze potential security risks and determine applicability to our environment Execute emergency vulnerability workflows and procedures Stay informed about publicly disclosed vulnerabilities (CVEs) and potential vulnerabilities (rumors, blogs, partial public analysis). Map vulnerability assessment results to asset inventory and key stakeholders. Calculate prioritization based on risk assessment. Identify and recommend appropriate compensating controls to manage and remediate vulnerability risk with the focus on reducing potential impacts Support development of vulnerability metrics and remediation-related dashboards and reports Understand enterprise policies and advise policies and technical standards with specific regard to vulnerability management, scanning procedures and secure configuration Coordinate with key business partners to understand, prioritize, and coordinate vulnerability remediation activities Collaborate with peers from across the organization and maintain excellent working relationships with key partners across Technology Organization functions and business partners Understand business requirements and work with business partners to define appropriate solutions, meeting both security mandates and business needs Demonstrates strong critical thinking and curiosity, essential for effectively analyzing and addressing security threats and vulnerabilities. Demonstrate Fortune 200 Company values of Safety First, Unquestionable Trust, Superior Performance, and Total Commitment   Job Requirements :     Required to submit to a thorough background examination Ability to understand business requirements and present appropriate solutions Ability to work independently or within a team Ability to effectively organize tasks, manage multiple priorities/details, meet schedules, and deliver on commitments Solid verbal and written communication skills Demonstrated critical, independent thinking; demonstrated ability to conceive and present creative solutions Must pass NERC CIP & Insider Threat Protection background checks One or more relevant industry certifications (i.e., GSEC, CISSP, CISA) Occasional travel (up to 25% at times) to local and regional locations in pursuit of job duties and requirements   __________________________________________________________________ HIRING MANAGER'S PRE-SCREENING QUESTIONS (Responses Required for Interview Consideration):    Please answer  ALL  of the questions BELOW as accurately as possible.  If you're determined to be reasonably qualified, you will be submitted to our client for a potential interview and direct hiring consideration for this great opportunity. 1) Describe your previous technology background with specific focus on any identity roles. 2) What is one of the most critical risks in identity today – and how would you solve it in short order? 3) What are two ways that cloud identities are vastly different from managing on-prem identities? 4) Other than AI, what are some of the most important technology trends right now? 5) Are you a US Citizen or   current   Green Card Holder? 6) What are your base salary requirements. A range is fine. __________________________________________________________________ How To Apply: 1) Please create and apply with a   SINGLE   (Word or PDF)  merged  document. A single merged document is required for submission to the Hiring Manager for interview consideration.,  2) At the   TOP   of your document, copy and paste each pre-screening question and include your responses to the  pre-screening   questions . You must fully and accurately respond to ALL of the pre-screening questions. 3) Include your standard   resume content   below your responses to the screening questions. Your resume must clearly show your personal email address and direct phone number. 4) Click on the  APPLY  button or email  support@mpndiversityrecruiters.com  to send BOTH your responses to the  prescreening questions  and your  resume  to MPN Diversity Recruiters. Document Creation Tips:   The easiest way to create the required SINGLE document correctly is to open your existing resume file, insert a blank page at the top, copy and paste the screening questions from above into your document, add your responses to each question, and then save and email or upload the file. Call 404-629-9323 if you have any questions.
Full Time
Our  Fortune 200 Company  client is seeking to  DIRECTLY HIRE  a  Cybersecurity Exposure Management Analyst  to join its Cybersecurity organization.  This position can be based in either Atlanta, GA or Birmingham, AL. CANDIDATE SUBMISSION REQUIREMENTS:   Please carefully read before applying. You can only be considered for referral to the hiring manager IF you meet ALL of the requirements below.   1) You must apply with a  SINGLE  document (in Word or PDF). This single merged document must include each of the Hiring Manager's  pre-screening questions  shown BELOW and your detailed responses (at the TOP) followed by your usual resume/CV content. 2) You must be  permanently  authorized to work in the U.S. WITHOUT requiring any current or future sponsorship. In a nutshell, you must be a U.S. citizen or current permanent resident (green) cardholder. 3) You must currently reside or self-relocate to be within commutable distance to  Atlanta, GA  or  Birmingham, AL . 4) You must be reasonably qualified and comply with ALL of the above requirements to receive consideration for an interview referral to the Hiring Manager for this role. In our Fortune 200 Company , our core objective is to ensure safe and reliable computing environment for the consumers of our services, both internally and externally. Our complex environment generates a constant stream of challenges which require continual innovation with an evolving set of technologies. Keeping the network safe and reliable ensures that our users stay connected with our applications, products and services. Our  Fortune 200 Company is committed to supporting the professional development and growth of its employees and fosters an environment of diversity, equity, and inclusion. Position Overview: Fortune 200 Company  is seeking a passionate and experienced Exposure Management Analyst to join our Cybersecurity organization . This is a technical, hands-on role that requires the ability to assess exposures, analyze risks, and advise strategies to mitigate exposure. This role will support day-to-day continuous threat and exposure management operations focused on identifying and escalating exposed risks. Work outputs will support implementation of security technologies and controls to improve defensive posture, implementation of processes in support of investigations, and development of detection capabilities.   Qualifications: Bachelor’s degree in computer science, technology, engineering or security-related field or equivalent experience Minimum 5 years IT or security experience Demonstrated expertise in supporting vulnerability and patch management programs, enhancing application security, and conducting thorough analyses of potential exposures Experience working with vulnerability scanning, attack surface management, and cloud security posture management tools Understanding of OWASP common vulnerabilities and testing methodologies Understanding of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, code injection, race conditions, covert channel, replay, return-oriented attacks) Understanding and familiarity with different operating systems (e.g., Windows and LINUX/UNIX systems) Knowledge of IT security / hardening best practices; including but not limited to operating systems, web applications, and network devices. Experience building interactive dashboards and reports in PowerBI to visualize security metrics and exposure management data, including remediation progress, risk exposure, etc. Proficient in Microsoft Excel, including advanced functions such as PivotTables, VLOOKUP, and data analysis tools to organize, summarize, and interpret complex datasets. Experience using a SIEM to run search queries, perform log analysis, and build dashboards to monitor potential exposures Ability to effectively organize tasks, manage multiple priorities/details, meet schedules, and deliver on commitments Ability to thrive in a fast-paced environment, demonstrating adaptability and flexibility in response to changing priorities and emerging threats. Experience driving discussions and consensus across a broad group of stakeholders and cross functional teams regarding patching, security recommendations, and mitigations strategies Strong verbal and written communication skills, with the ability to work independently and collaboratively within a team. Proven experience interacting with both technical and non-technical stakeholders.   Job Responsibilities:    Support day-to-day operations of the exposure management program, including data review, report processing, and trend analysis. Track remediation of identified risks and mitigation strategies and escalate findings to key stakeholders. Ability to analyze potential security risks and determine applicability to our environment Execute emergency vulnerability workflows and procedures Stay informed about publicly disclosed vulnerabilities (CVEs) and potential vulnerabilities (rumors, blogs, partial public analysis). Map vulnerability assessment results to asset inventory and key stakeholders. Calculate prioritization based on risk assessment. Identify and recommend appropriate compensating controls to manage and remediate vulnerability risk with the focus on reducing potential impacts Support development of vulnerability metrics and remediation-related dashboards and reports Understand enterprise policies and advise policies and technical standards with specific regard to vulnerability management, scanning procedures and secure configuration Coordinate with key business partners to understand, prioritize, and coordinate vulnerability remediation activities Collaborate with peers from across the organization and maintain excellent working relationships with key partners across Technology Organization functions and business partners Understand business requirements and work with business partners to define appropriate solutions, meeting both security mandates and business needs Demonstrates strong critical thinking and curiosity, essential for effectively analyzing and addressing security threats and vulnerabilities. Demonstrate Fortune 200 Company values of Safety First, Unquestionable Trust, Superior Performance, and Total Commitment   Job Requirements :     Required to submit to a thorough background examination Ability to understand business requirements and present appropriate solutions Ability to work independently or within a team Ability to effectively organize tasks, manage multiple priorities/details, meet schedules, and deliver on commitments Solid verbal and written communication skills Demonstrated critical, independent thinking; demonstrated ability to conceive and present creative solutions Must pass NERC CIP & Insider Threat Protection background checks One or more relevant industry certifications (i.e., GSEC, CISSP, CISA) Occasional travel (up to 25% at times) to local and regional locations in pursuit of job duties and requirements   __________________________________________________________________ HIRING MANAGER'S PRE-SCREENING QUESTIONS (Responses Required for Interview Consideration):    Please answer  ALL  of the questions BELOW as accurately as possible.  If you're determined to be reasonably qualified, you will be submitted to our client for a potential interview and direct hiring consideration for this great opportunity. 1) Describe your previous technology background with specific focus on any identity roles. 2) What is one of the most critical risks in identity today – and how would you solve it in short order? 3) What are two ways that cloud identities are vastly different from managing on-prem identities? 4) Other than AI, what are some of the most important technology trends right now? 5) Are you a US Citizen or   current   Green Card Holder? 6) What are your base salary requirements. A range is fine. __________________________________________________________________ How To Apply: 1) Please create and apply with a   SINGLE   (Word or PDF)  merged  document. A single merged document is required for submission to the Hiring Manager for interview consideration.,  2) At the   TOP   of your document, copy and paste each pre-screening question and include your responses to the  pre-screening   questions . You must fully and accurately respond to ALL of the pre-screening questions. 3) Include your standard   resume content   below your responses to the screening questions. Your resume must clearly show your personal email address and direct phone number. 4) Click on the  APPLY  button or email  support@mpndiversityrecruiters.com  to send BOTH your responses to the  prescreening questions  and your  resume  to MPN Diversity Recruiters. Document Creation Tips:   The easiest way to create the required SINGLE document correctly is to open your existing resume file, insert a blank page at the top, copy and paste the screening questions from above into your document, add your responses to each question, and then save and email or upload the file. Call 404-629-9323 if you have any questions.

Modal Window

  • Home
  • Contact Us
  • About Us
  • Terms & Conditions
  • Employers
  • Post a Job
  • Sign in
  • Search Resumes
  • Job Board Solutions Guide
  • MPN Recruiting Solutions Guide
  • Job Seekers
  • Find Jobs
  • Sign in
  • Create Resume
  • eNewsletter Archives
  • Blog/Articles
  • mpnCoaching.com
  • MPN Sites & Social Media
  • mpnDiversityRecruiters.com
  • mpnEmpowerED.com
  • mpnConsulting.com
  • Facebook
  • Twitter
  • LinkedIn
© 1998-2025 Minority Professional Network, Inc. (MPN)