Command Center Analyst- (Splunk Required)
New Today
Overview We are seeking experienced Command Center Analysts to join a global IT operations team responsible for real-time monitoring, incident triage, and service restoration coordination across enterprise infrastructure platforms. This is a high-impact role supporting critical IT services in a 24x7 environment.
Responsibilities Monitoring & Analysis: Proactively monitor systems, networks, and applications using enterprise-grade tools; Assess ongoing change activities for potential service impacts; Analyze alerts and events to identify issues and initiate appropriate actions
Incident Management & Operations: Triage and assign P1/P2 incidents per established procedures; Act as a focal point for status updates during high-impact changes; Escalate incidents and drive timely resolution; Participate in shift turnovers and daily operational briefings
Communication & Stakeholder Engagement: Provide timely and accurate incident updates to technical and business stakeholders; Collaborate across cross-functional teams to expedite resolution; Support hyper-care efforts for major releases and migrations
Documentation & Reporting: Maintain detailed incident logs in ITSM tools (e.g., ServiceNow); Ensure accuracy in knowledge articles and procedural documentation; Assist in post-mortem documentation and reporting on incident trends
Continuous Improvement: Identify opportunities for operational improvements and automation; Participate in post-incident reviews and root cause analyses; Support the development of best practices within the Command Center
Must-Have Skills & Experience Splunk: Hands-on experience with Splunk for monitoring and analysis (non-negotiable)
ITIL: Strong understanding and practical application of ITIL-based processes (Event, Incident, Change, Problem Management)
5–10 years of experience in data center or IT Command Center operations
Proven history of incident response in global enterprise environments
Familiarity with ITSM platforms (e.g., ServiceNow, Remedy)
Ability to interpret Wireshark captures for incident analysis
Excellent communication skills with the ability to convey technical information clearly
Strong analytical mindset and ability to manage multiple high-priority tasks
Nice-to-Have Skills Experience with additional monitoring tools: SolarWinds, DataDog, NetScout (nGenius), Nagios, Spectrum
Experience supporting global user bases
Exposure to low ticket volume environments with high-impact responsibilities
Prior involvement in post-incident reviews and continuous improvement initiatives
Additional Details Location: 100% Remote
Shift: Night Shift – Monday to Wednesday, 6:00 PM to 6:00 AM EST; Thursday, 12:00 AM to 6:00 AM EST (40 hours/week)
Pay Range: $40.00 - $50.00/hr
Workplace Type: Fully remote
Application Deadline: This position is anticipated to close on Sep 30, 2025
Must meet the listed requirements: This role requires hands-on experience with Splunk and a strong understanding of ITIL-based processes. Candidates without Splunk and ITIL experience will not be considered.
About TEKsystems TEKsystems is an Allegis Group company and an equal opportunity employer. We partner in transformation and work with clients to activate ideas and solutions across North America, Europe and Asia.
#J-18808-Ljbffr
- Location:
- Chicago, IL, United States
- Salary:
- $250,000 +
- Job Type:
- FullTime
- Category:
- Finance