Enterprise Operation Center (EOC) Monitoring and Incident Response Analyst jobs in United States
info-icon
This job has closed.
company-logo

Peraton · 1 month ago

Enterprise Operation Center (EOC) Monitoring and Incident Response Analyst

Peraton is a next-generation national security company that drives missions of consequence spanning the globe. They are seeking an Enterprise Operation Center (EOC) Monitoring and Incident Response Analyst to provide continuous operations monitoring and ensure effective incident response to minimize operational impact.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Monitor multiple systems and applications using monitoring tools, such as Zabbix, Grafana, Splunk, AppDynamics, Oracle Analytics Publisher (OAS), Splunk, AppDynamics, Aria vROPS, to ensure availability of systems and applications across environments
Work with CST support teams to develop and maintain proactive monitoring solutions that assess the availability, performance, capacity, and the environment’s overall health
Communicate the operational state of the enterprise systems to teams within CAEIO and external stakeholders, including the customer
Provide a timely response to all incidents, outages and performance alerts. Categorize issues for escalation to appropriate technical teams
Recognize, identify, and prioritize incidents in accordance with customer business requirements, organizational policies, and operational impact
Support multiple technical teams in 24x7 operational environments with high uptime requirements
Ensure trouble tickets are updated in a timely manner and within the parameters of multiple SLAs by coordinating with internal and external support teams
Draft and verify Knowledgebase articles to assist technicians with possible recurring issues
Maintain user and administrator accounts using Active Directory and Office 365
Troubleshoot third-party applications, such as Configuration Manager (CM), Symantec Endpoint Protection (SEP), Symantec Anti-Virus definitions (AVR), McAfee Agent, and McAfee Policy Auditor on virtual and physical servers
Coordinate with sites to support shutdown and start-up of physical and virtual systems for scheduled maintenances
Create Standard Operation Procedures for tasks that team members perform

Qualification

Incident ResponseMonitoring ToolsService Level AgreementsServiceNowITIL4 FoundationsActive DirectoryTeam CoordinationTroubleshootingCommunication Skills

Required

U.S. citizenship and an active SECRET Government Security Clearance
Minimum of two years demonstrated experience triaging and prioritizing critical incidents to directly align with mission objectives
Ability to establish thresholds for alerting and to coordinate with technical teams to route alerts appropriately
Minimum of two years of experience collecting and analyzing metrics across a distributed, complex IT enterprise
Experience reporting against and managing Service Level Agreements (SLAs)
BS degree and 5 years' experience or MS degree and 3 years' experience or high school diploma/equivalent and 9 years' experience

Preferred

ServiceNow expertise
ITIL4 Foundations certification
Experience with monitoring IT infrastructure using internal or COTS monitoring tools is highly desired

Benefits

Overtime
Shift differential
Discretionary bonus

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase