IT Security Analyst Senior

J.B. Hunt Transport Services, Inc.Phoenix, AZ
Onsite

About The Position

The IT Security Analyst Senior is responsible for ensuring data security within the Judicial Branch of Arizona in Maricopa County. This position ensures that information created, acquired or maintained by the Branch, and its authorized users, is used in accordance with its intended purpose; to protect Branch information and its infrastructure from external or internal threats; and to assure that the Branch complies with statutory and regulatory requirements regarding information access, security and privacy. This position will be responsible for assisting Information Technology in day-to-day compliance activities, security reviews, and working to address findings. The Superior Court of the Judicial Branch of Arizona in Maricopa County is dedicated to providing a safe, fair, and impartial forum for resolving disputes, enhancing access to our services, and providing innovative, evidenced-based practices that improve the safety of our community and ensure the public’s trust and confidence in the Judicial Branch. The Superior Court in Maricopa County, one of the largest, most innovative, and progressive trial courts in the nation, seeks innovative individuals to join our team who will embrace our vision of excellence and the principles inherent in the Rule of Law...every person, every day, every time. We fulfill these principles through a culture that values fairness, respect, integrity, innovation, and safety.

Requirements

  • Bachelor's degree in Computer Science or related field
  • Five (5) years of experience in IT security and compliance, or related, with minimum three (3) years of cybersecurity experience in an enterprise environment.
  • Must possess or can obtain by the time of hire, a valid Arizona driver's license.
  • Strong knowledge of computer networks, operating systems, and software development is essential.
  • Understanding of cybersecurity concepts such as cryptography, network security, and security protocols
  • Understanding of firewalls, SIEM, antivirus, and vulnerability management concepts.
  • Understanding NextGen firewalls, SIEM, EDR, and vulnerability management concepts.
  • Understanding security frameworks and best practices such as NIST Cybersecurity Framework, NIST 800-53, CIS Controls, and related standards.
  • Knowledge of SIEM platforms (e.g., Microsoft Sentinel, Splunk, QRadar)
  • Knowledge of Endpoint Detection & Response (EDR)
  • Knowledge of Identity and access monitoring tools
  • Knowledge of Email security platforms
  • Knowledge of Network security monitoring tools
  • Experience conducting security investigations, log analysis, and threat hunting.
  • Analytical and problem-solving skills
  • Excellent written and verbal communication skills
  • Interpersonal and collaborative skills
  • Ability to remain organized and adapt to unexpected events, new facts, and rapidly changing circumstances
  • Ability to interact, communicate, and relate security and risk-related concepts to technical and nontechnical audiences
  • Ability to thrive in a sense-of-urgency environment and leverage best practices
  • Ability to effectively diagnose an issue and recommend a solution
  • Ability to work both independently and also as part of a team

Nice To Haves

  • CompTIA Security+ certification or equivalent
  • Experience with cloud security monitoring (Azure, AWS, or M365 environments).
  • Familiarity with automation and scripting (PowerShell, Python, KQL, etc.).
  • Experience leveraging AI and machine learning tools in a cybersecurity context, including AI-assisted threat detection, AI-powered SIEM/SOAR platforms, anomaly detection models, or use of large language models (LLMs) for security operations (e.g., Microsoft Copilot for Security, Sentinel AI features).
  • Familiarity with AI security risks and adversarial AI threats, such as prompt injection, model poisoning, deepfake-enabled social engineering, or misuse of AI-generated content in phishing campaigns.

Responsibilities

  • Serve as a senior escalation point for security incidents and complex investigations across enterprise environments.
  • Monitor, analyze, and respond to security alerts from SIEM, EDR, cloud security platforms, email security systems, and network monitoring tools.
  • Conduct threat hunting activities to proactively identify adversary behavior and potential compromise within the environment.
  • Perform forensic analysis of endpoints, user activity, and network traffic to determine scope, root cause, and impact of security events.
  • Develop and tune detection rules, alerts, and correlation logic to improve visibility and reduce false positives.
  • Coordinate incident response activities including containment, eradication, recovery, and post-incident reporting.
  • Collaborate with IT and system administrators to implement security improvements and remediation actions.
  • Support vulnerability management efforts by analyzing findings, prioritizing remediation, and validating corrective actions.
  • Assist with security architecture reviews, system hardening, and implementation of security controls.
  • Contribute to the development of security policies, procedures, incident response playbooks, and operational documentation.
  • Provide technical mentorship and guidance to security analysts and SOC personnel.
  • Support regulatory compliance and audit requirements by documenting controls and participating in security assessments.
  • Leads lower-level staff in network vulnerability/threat analysis and risk assessments; reviews and analyzes output from network security devices
  • Utilize AI-powered security tools and platforms (e.g., Microsoft Copilot for Security, AI-enhanced SIEM/SOAR capabilities) to accelerate threat detection, alert triage, and incident investigation, improving analyst efficiency and response times.
  • Identify, assess, and respond to AI-specific threats and attack vectors targeting enterprise environments, including adversarial manipulation of AI/ML systems, AI-generated phishing and deepfake social engineering campaigns, and unauthorized use of generative AI tools within the organization.
  • Contribute to the development and enforcement of organizational AI governance policies, ensuring secure and compliant use of AI tools by staff, evaluating AI vendor security posture, and advising leadership on emerging AI-related risks to court systems and sensitive judicial data.

Benefits

  • Generous paid time off
  • Paid sick leave
  • 10 paid holidays
  • Affordable medical, dental, and vision insurance
  • Coverage by one of several State-sponsored retirement pension plans
  • Employee assistance program
  • Wellness incentives
  • Option of life insurance
  • Disability insurance
  • Group legal plan
  • Pet insurance
  • Public Service Loan Forgiveness (PSLF) Program eligibility
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service