Command Center Analyst- (Splunk Required)

New Today

Overview We are seeking experienced Command Center Analysts to join a global IT operations team responsible for real-time monitoring, incident triage, and service restoration coordination across enterprise infrastructure platforms. This is a high-impact role supporting critical IT services in a 24x7 environment. Responsibilities Monitoring & Analysis: Proactively monitor systems, networks, and applications using enterprise-grade tools; Assess ongoing change activities for potential service impacts; Analyze alerts and events to identify issues and initiate appropriate actions Incident Management & Operations: Triage and assign P1/P2 incidents per established procedures; Act as a focal point for status updates during high-impact changes; Escalate incidents and drive timely resolution; Participate in shift turnovers and daily operational briefings Communication & Stakeholder Engagement: Provide timely and accurate incident updates to technical and business stakeholders; Collaborate across cross-functional teams to expedite resolution; Support hyper-care efforts for major releases and migrations Documentation & Reporting: Maintain detailed incident logs in ITSM tools (e.g., ServiceNow); Ensure accuracy in knowledge articles and procedural documentation; Assist in post-mortem documentation and reporting on incident trends Continuous Improvement: Identify opportunities for operational improvements and automation; Participate in post-incident reviews and root cause analyses; Support the development of best practices within the Command Center Must-Have Skills & Experience Splunk: Hands-on experience with Splunk for monitoring and analysis (non-negotiable) ITIL: Strong understanding and practical application of ITIL-based processes (Event, Incident, Change, Problem Management) 5–10 years of experience in data center or IT Command Center operations Proven history of incident response in global enterprise environments Familiarity with ITSM platforms (e.g., ServiceNow, Remedy) Ability to interpret Wireshark captures for incident analysis Excellent communication skills with the ability to convey technical information clearly Strong analytical mindset and ability to manage multiple high-priority tasks Nice-to-Have Skills Experience with additional monitoring tools: SolarWinds, DataDog, NetScout (nGenius), Nagios, Spectrum Experience supporting global user bases Exposure to low ticket volume environments with high-impact responsibilities Prior involvement in post-incident reviews and continuous improvement initiatives Additional Details Location: 100% Remote Shift: Night Shift – Monday to Wednesday, 6:00 PM to 6:00 AM EST; Thursday, 12:00 AM to 6:00 AM EST (40 hours/week) Pay Range: $40.00 - $50.00/hr Workplace Type: Fully remote Application Deadline: This position is anticipated to close on Sep 30, 2025 Must meet the listed requirements: This role requires hands-on experience with Splunk and a strong understanding of ITIL-based processes. Candidates without Splunk and ITIL experience will not be considered. About TEKsystems TEKsystems is an Allegis Group company and an equal opportunity employer. We partner in transformation and work with clients to activate ideas and solutions across North America, Europe and Asia.
#J-18808-Ljbffr
Location:
Chicago, IL, United States
Salary:
$250,000 +
Job Type:
FullTime
Category:
Finance

We found some similar jobs based on your search