Senior SOC Analyst
Not Disclosed
Phoenix, AZ
6.0 Months
Not Disclosed
Not Disclosed
Government - State
$41/hour - $46/hour
Job Posted on (Apr 27, 2026)
Reference Number:
RKAZSS275
Job Description
This position plays an essential role in protecting the confidentiality, integrity and availability of the client information and systems. This position ensures that the appropriate security monitoring and analysis controls, standards and procedures are properly configured and utilized, to protect confidential information used by the client from known and unknown internal or external threats. These threats include, but are not limited to, identity theft, data loss, data damage, unauthorized access and
cyber-attacks. This position defends the client against attacks which disrupt, destroy, or threaten the delivery of essential services for the client.
Conducts daily traffic analysis, identifies and characterizes anomalous activity Performs in-depth system and network forensics to identify and eradicate threats.
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
Generates incident reports, investigates suspicious network and system activity
Perform cyber defense trend analysis and reporting.
Determine tactics, techniques, and procedures (TTPs) for intrusion sets.
Reconstruct a malicious attack or activity based off network traffic.
Proactively identifies threats to the enterprise, initiates the distribution of enterprise wide alerts
Coordinate with enterprise-wide cyber defense staff to validate network alerts.
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
Monitors software patches, security fixes, and tests and validates modified systems
Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy.
Recommend computing environment vulnerability corrections.
Processes, documents, and coordinates resolution of cyber incidents with appropriate teams
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
This position provides coverage to the client for swing shifts and covering weekend hours.
Required:
Two years of experience in a security operations environment, or related work and demonstrated interest in security operations.
A solid, end-to-end understanding of Information technology systems, especially as they apply to security.
Ability to successfully triage security detections and alerts from any source (network, endpoint, audit logs, identity, etc..), perform incident response and support incident management.
Ability to work under pressure, prioritize issues, and maintain sufficient attention to ensure an appropriate response to cyber alerts and incidents.
Must have professional engagement and customer service skills to positively support stakeholder institutions and partners statewide.
Fast learner; ability to work and solve problems creatively
Notes:
Position is 100% onsite
Shifts would either be Tuesday-Saturday 12pm-9pm (Saturday hours are flexible) or Sunday-Thursday (Sunday hours are flexible) 12pm-9pm
VIVA is an equal opportunity employer. All qualified applicants have an equal opportunity for placement, and all employees have an equal opportunity to develop on the job. This means that VIVA will not discriminate against any employee or qualified applicant on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.