Irlande

Incident Response Analyst II

Incident Response Analyst II chez Astreya

Une Opportunité Professionnelle en Irlande

Descriptif du Poste
L’Incident Response Center (IRC) constitue la première ligne de défense dans le cadre de la détection rapide et de la réponse aux incidents. Les analystes IRC sont chargés d’opérer à l’échelle mondiale, intervenant sur différents sites de centres de données pour gérer les alertes provenant de divers outils de surveillance et d’automatisation. Ce poste requiert un niveau d’engagement et de compétence élevé, incluant des responsabilités critiques en termes de gestion des incidents.

Responsabilités Principales
Les missions comprennent :

  • Gestion des Incidents et Problèmes
    Les analystes gèrent le cycle complet des incidents, de la détection à la résolution, en agissant comme commandants d’incidents, tout en maintenant les délais de service (SLA). Ils documentent les actions entreprises et contribuent à l’amélioration continue des systèmes.

  • Surveillance et Réaction aux Alarmes
    Cela inclut la gestion en temps réel des alarmes d’infrastructure et l’évaluation de leur gravité, avec une communication claire avec les équipes de résolution.

  • Gestion de la Sécurité Physique et de la Sécurité
    Les analystes surveillent les systèmes de contrôle d’accès, la vidéosurveillance (CCTV) et répondent aux alarmes liées à la sécurité.

  • Réponse aux Incidents dans le Cloud
    Ce volet requiert la surveillance et le soutien tant pour les infrastructures sur site que pour les systèmes basés sur le cloud, garantissant l’intégrité opérationnelle et rapide des services.

Compétences Requises
Les candidats doivent posséder :

  • Formation et Expérience
    Une expérience de plus de deux ans dans un environnement opérationnel 24/7 est nécessaire. Un diplôme en technologie de l’information est préféré.

  • Compétences Techniques
    Connaissance des réseaux IP, de l’environnement des centres de données et de la santé des serveurs. La familiarité avec les lois sur la protection des données, comme le GDPR, est également nécessaire.

  • Compétences en Communication
    Des compétences écrites et verbales solides sont essentielles pour naviguer efficacement dans un environnement dynamique.

Contexte de Travail
Cette fonction est sur site à Dublin, avec des horaires de travail variables, y compris la nécessité de travailler les week-ends et les jours fériés.

Environnement de Travail Inclusif
Astreya promeut une culture d’inclusion, d’égalité des chances et de respect de la diversité. Tous les candidats, quelles que soient leurs origines, sont encouragés à postuler, et l’entreprise s’engage à examiner chaque candidature de manière impartiale.

Pour plus d’informations et pour postuler, cliquez sur le lien ci-dessous :
Postulez dès maintenant !


📅 Date de publication de l’offre : Tue, 13 May 2025 22:54:47 GMT

🏢 Entreprise : Astreya

📍 Lieu : Dublin

💼 Intitulé du poste : Incident Response Analyst II

💶 Rémunération proposée :

📝 Description du poste : SummaryThe IRC (Incident Response Center) is the first layer of defense responsible for quick detection and incident response using various monitoring and automation tools, conducting thorough investigation of alerts, classification, and triage. The IRC Analyst is responsible for delivering operations within the IRC across all client data center sites globally. IRC analysts are expected to respond to all alarms/alerts set in the data center environment, including Infrastructure Management (DCIM), Server Automation Operations System (SAOS), CCTV, Access Control Systems (ACS), and Building Management Systems (BMS), providing deep understanding and intelligence of the criticality and impact of incidents to resolver groups.ResponsibilitiesIncident & Problem ManagementAnalysts are responsible for the full lifecycle of incident management, from detection through to resolution and root cause analysis (RCA). This includes acting as incident commanders, maintaining SLAs, documenting actions, and providing insights to support continuous improvement efforts across teams and systems.Investigate, report, and respond to alerts, incident response (war room, remote bridges).Respond to incidents and critical situations in a calm, problem-solving manner, and conduct in-depth investigation of alerts.Be the first line of defense using monitoring and automation tools to conduct investigation, classification, and triage, all within prescribed SLAs.Provide deep understanding and intelligence of incident criticality and impact to resolver groups.Ensure detailed records of alarm handling activities, including actions taken and resolutions in ticketing tools; file incident reports.Act as incident commander during major incidents.Understand internal/external communication methods and stakeholder responsibilities.Support program managers and facilitate project deliverables, improving operational and engineering initiatives.Conduct root cause analysis (RCA) to determine recurring problems.Use in-depth questioning and analysis to determine the underlying cause of incidents or problems (Who, What, Where, When, Why).Perform duties in compliance with SOPs, MOPs, Runbooks, and Playbooks.Server, DCIM, Network and Traffic Alarms OperationsThis function involves real-time monitoring of infrastructure alarms, determining the severity of alerts, escalating appropriately, and maintaining clear communications with resolver teams. It ensures uptime and system integrity across servers, network infrastructure, and environmental systems.Continuously monitor alarm dashboards and systems.Investigate and respond to alarms related to Network, Data Center Environment, Server Health, Facility Security, and Safety.Identify and acknowledge incidents associated with alarms.Assess incidents to determine their criticality and operational impact.Engage resolver groups and escalate to higher tiers or management following established paths.Maintain communication with teams, stakeholders, and incident responders.Follow documented procedures to resolve incidents promptly and effectively.Ensure accurate records of alarm handling and resolution activities in ticketing tools.Comply with SOPs, MOPs, Runbooks, and Playbooks.Threat Intelligence, Critical Event ManagementAnalysts monitor global threat feeds and operational alerts to protect ByteDance personnel and assets. Responsibilities include triaging alerts related to weather, security, travel, and regional instability, then coordinating appropriate response actions, escalating to law enforcement if necessary, and compiling response reports.Monitor Everbridge Visual Command Center (VCC), InternationalSOS emails, and open-source tools for real-time incidents affecting ByteDance assets and travelers.Monitor tools or queries for specific stakeholder requests.Report on violence, severe weather, or threats to life, property, and assets.Coordinate emergency responses, including with law enforcement if required.Verify incident information accuracy through secondary sources.Generate heatmaps to highlight affected areas during significant events.Collaborate with security and operational teams for a coordinated response.Implement incident containment and mitigation strategies.Document incident details, response actions, and lessons learned.Follow SOPs, MOPs, Runbooks, and Playbooks.Physical Security and SafetyThe analyst monitors access control systems, CCTV, and safety-related alarms (e.g., fire, electrical, leaks). Responsibilities include reviewing footage, responding to security anomalies, and reporting incidents to security engineering teams while ensuring compliance with safety proceduresMonitor Closed-Circuit Television (CCTV) and Access Control Systems (ACS).Track alarms for safety events including electrical issues, fire hazards, equipment failures, and water leaks.Review camera footage for quality and area coverage.Investigate and report access control incidents.Report findings to the Security and Safety Engineering teams.Follow SOPs, MOPs, Runbooks, and Playbooks.Familiarity with Lenel and Genetec systems.Cloud Incident Response and MonitoringAs hybrid environments become more critical to business operations, IRC Analysts will be expected to monitor and support both on-premises infrastructure and cloud-based systems. Analysts will assist in identifying and responding to cloud-related incidents across platforms such as AWS, GCP, and Azure. Responsibilities include:Real-time monitoring of cloud infrastructure using tools such as AWS CloudWatch, Azure Monitor, and GCP Stackdriver.Incident triage and escalation of alerts related to cloud-based services and resources (e.g., compute, storage, networking).Coordination with Cloud Engineers and DevOps teams during cross-environment incidents to ensure rapid resolution and clear communications.Identification and classification of cloud service anomalies, including misconfigurations, degraded services, and unauthorized access attempts.Understanding of cloud-native architectures such as virtual private clouds (VPC), IAM, container orchestration (e.g., Kubernetes), and serverless functions.Documentation of root cause analysis (RCA) and corrective actions for cloud incidents, feeding back into playbooks and runbooks.Basic scripting and automation skills (Python, Bash, or PowerShell) for incident analysis and tooling.Awareness of cloud security protocols, including encryption, IAM policies, and compliance standards like ISO 27001 and SOC 2.QualificationsRequired Qualifications / Soft Skills2+ years of experience in a NOC, command center, or similar 24/7 operations environmentAbility to quickly triage and prioritize multiple incidents based on riskKnowledge of systems including IP Networks, DC Environment, and Server HealthStrong written and verbal communication skillsWorks well under pressure and within deadlinesExcellent communication and collaboration abilitiesStrong analytical and problem-solving skillsAbility to work independently and as part of a teamFamiliarity with data protection laws such as GDPRThis is an on-site role at client facilitiesMust be willing to work variable shifts, including weekends, and holidaysPreferred QualificationsDegree in Information TechnologyNetworking knowledge (IP, DNS, load balancing)Experience with Grafana, ticketing systems, and DC infrastructure.Certifications such as CompTIA Server+ or Schneider Electric DCCAExperience with Lenel, Genetec, or Avigilon systems is a plusProficiency with programming/scripting tools

➡️ Candidater en ligne


🔎 Offre d’emploi vérifiée et enrichie selon la ligne éditoriale de l’Association Artia13 : éthique, inclusion, transparence et vigilance contre les annonces trompeuses.

🌍 Retrouvez d’autres offres sur artia13.world

Artia13

Depuis 1998, je poursuis une introspection constante qui m’a conduit à analyser les mécanismes de l’information, de la manipulation et du pouvoir symbolique. Mon engagement est clair : défendre la vérité, outiller les citoyens, et sécuriser les espaces numériques. Spécialiste en analyse des médias, en enquêtes sensibles et en cybersécurité, je mets mes compétences au service de projets éducatifs et sociaux, via l’association Artia13. On me décrit comme quelqu’un de méthodique, engagé, intuitif et lucide. Je crois profondément qu’une société informée est une société plus libre.

Artia13 has 4285 posts and counting. See all posts by Artia13