The Alert Triage Analyst is responsible for monitoring, analyzing, and prioritizing system alerts to identify potential downtime or operational issues. This role involves initial investigation, documentation, and escalation of alerts to ensure timely incident response, and risk mitigation.
Key Responsibilities:
Continuously monitor system alerts from various sources.
Assess alert severity and determine whether it requires immediate action, further investigation, or escalation.
Identify patterns and trends in alerts to detect potential incidents or system issues.
Perform initial triage and validation of alerts to rule out false positives.
Gather relevant data, correlate information, and document findings.
Take appropriate first-level containment measures or actions when applicable.
Ensure established protocols are followed when escalating confirmed incidents or system issues to the relevant teams.
Maintain accurate records of all analyzed alerts, triage steps, and resolution.
Contribute to the continuous improvement of triage workflows and alert-handling procedure.
Monitoring of servers and network availability
Incident ticket handling and updating on the ticketing tool
Qualifications:
Basic knowledge of networking, server concepts and incident response principles.
Understanding of log analysis and threat intelligence techniques.
Strong analytical and problem-solving skills.
Ability to work under pressure and manage multiple alerts efficiently.
Familiarity on Jira ticketing systems.
Effective communication skills for clear documentation and collaboration with team members.
High attention to detail and a proactive approach to alerts and systems monitoring.
Bachelor's degree in Computer Science, Information Technology, or related field (or equivalent work experience).
Previous experience in a Network Operations Center (NOC) or similar monitoring environment.
May require shift work, including evenings, weekends, and holidays, depending on business needs.