Enterprise Operation Center (EOC) Monitoring and Incident Response Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

Peraton · 1 day ago

Enterprise Operation Center (EOC) Monitoring and Incident Response Analyst

Peraton is a next-generation national security company that drives missions of consequence. They are seeking an Enterprise Operation Center (EOC) Monitoring and Incident Response Analyst to provide continuous operations monitoring and incident response for critical systems and applications, ensuring operational integrity and timely issue resolution.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Monitor multiple systems and applications using monitoring tools, such as Zabbix, Grafana, Splunk, AppDynamics, Oracle Analytics Publisher (OAS), Splunk, AppDynamics, Aria vROPS, to ensure availability of systems and applications across environments
Work with CST support teams to develop and maintain proactive monitoring solutions that assess the availability, performance, capacity, and the environment's overall health
Communicate the operational state of the enterprise systems to teams within CAEIO and external stakeholders, including the customer
Provide a timely response to all incidents, outages and performance alerts. Categorize issues for escalation to appropriate technical teams
Recognize, identify, and prioritize incidents in accordance with customer business requirements, organizational policies, and operational impact
Support multiple technical teams in 24x7 operational environments with high uptime requirements
Ensure trouble tickets are updated in a timely manner and within the parameters of multiple SLAs by coordinating with internal and external support teams
Draft and verify Knowledgebase articles to assist technicians with possible recurring issues
Maintain user and administrator accounts using Active Directory and Office 365
Troubleshoot third-party applications, such as Configuration Manager (CM), Symantec Endpoint Protection (SEP), Symantec Anti-Virus definitions (AVR), McAfee Agent, and McAfee Policy Auditor on virtual and physical servers
Coordinate with sites to support shutdown and start-up of physical and virtual systems for scheduled maintenances
Create Standard Operation Procedures for tasks that team members perform

Qualification

Incident ResponseMonitoring ToolsService Level AgreementsServiceNowITIL4 FoundationsActive DirectoryMetrics AnalysisTroubleshootingStandard Operating ProceduresCommunication

Required

U.S. citizenship and an active SECRET Government Security Clearance
Minimum of two years demonstrated experience triaging and prioritizing critical incidents to directly align with mission objectives
Ability to establish thresholds for alerting and to coordinate with technical teams to route alerts appropriately
Minimum of two years of experience collecting and analyzing metrics across a distributed, complex IT enterprise
Experience reporting against and managing Service Level Agreements (SLAs)
BS degree and 2 years' experience or high school diploma/equivalent and 6 years' experience

Preferred

ServiceNow expertise
ITIL4 Foundations certification
Experience with monitoring IT infrastructure using internal or COTS monitoring tools is highly desired

Benefits

Medical
Dental
Vision
Life
Health savings account
Short/long term disability
EAP
Parental leave
401(k)
Paid time off (PTO) for vacation
Company paid holidays

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase