Astreya Logo

Astreya

Incident Response Analyst II

Reposted 3 Days Ago
Be an Early Applicant
In-Office
San Jose, CA, USA
73K-115K Annually
Junior
In-Office
San Jose, CA, USA
73K-115K Annually
Junior
The Incident Response Analyst II monitors, investigates, and responds to incidents using various tools, ensuring compliance and conducting root cause analysis, while managing communications and documentation across teams.
The summary above was generated by AI
Job Description
Incident Response Center (Analyst) 

Job Title – IRC Analyst

Summary

The IRC (Incident Response Center) is the first layer of defense responsible for quick detection and incident response using various monitoring and automation tools, conducting thorough investigation of alerts, classification, and triage. The IRC Analyst is responsible for delivering operations within the IRC across all client data center sites globally. IRC analysts are expected to respond to all alarms/alerts set in the data center environment, including Infrastructure Management (DCIM), Server Automation Operations System (SAOS), CCTV, Access Control Systems (ACS), and Building Management Systems (BMS), providing deep understanding and intelligence of the criticality and impact of incidents to resolver groups.

Responsibilities 

Incident & Problem Management

Analysts are responsible for the full lifecycle of incident management, from detection through to resolution and root cause analysis (RCA). This includes acting as incident commanders, maintaining SLAs, documenting actions, and providing insights to support continuous improvement efforts across teams and systems.

  • Investigate, report, and respond to alerts, incident response (war room, remote bridges).

  • Respond to incidents and critical situations in a calm, problem-solving manner, and conduct in-depth investigation of alerts.

  • Be the first line of defense using monitoring and automation tools to conduct investigation, classification, and triage, all within prescribed SLAs.

  • Provide deep understanding and intelligence of incident criticality and impact to resolver groups.

  • Ensure detailed records of alarm handling activities, including actions taken and resolutions in ticketing tools; file incident reports.

  • Act as incident commander during major incidents.

  • Understand internal/external communication methods and stakeholder responsibilities.

  • Support program managers and facilitate project deliverables, improving operational and engineering initiatives.

  • Conduct root cause analysis (RCA) to determine recurring problems.

  • Use in-depth questioning and analysis to determine the underlying cause of incidents or problems (Who, What, Where, When, Why).

  • Perform duties in compliance with SOPs, MOPs, Runbooks, and Playbooks.
     

Server, DCIM, Network and Traffic Alarms Operations

This function involves real-time monitoring of infrastructure alarms, determining the severity of alerts, escalating appropriately, and maintaining clear communications with resolver teams. It ensures uptime and system integrity across servers, network infrastructure, and environmental systems.

  • Continuously monitor alarm dashboards and systems.

  • Investigate and respond to alarms related to Network, Data Center Environment, Server Health, Facility Security, and Safety.

  • Identify and acknowledge incidents associated with alarms.

  • Assess incidents to determine their criticality and operational impact.

  • Engage resolver groups and escalate to higher tiers or management following established paths.

  • Maintain communication with teams, stakeholders, and incident responders.

  • Follow documented procedures to resolve incidents promptly and effectively.

  • Ensure accurate records of alarm handling and resolution activities in ticketing tools.

  • Comply with SOPs, MOPs, Runbooks, and Playbooks.
     

Threat Intelligence, Critical Event Management

Analysts monitor global threat feeds and operational alerts to protect ByteDance personnel and assets. Responsibilities include triaging alerts related to weather, security, travel, and regional instability, then coordinating appropriate response actions, escalating to law enforcement if necessary, and compiling response reports.

  • Monitor Everbridge Visual Command Center (VCC), InternationalSOS emails, and open-source tools for real-time incidents affecting ByteDance assets and travelers.

  • Monitor tools or queries for specific stakeholder requests.

  • Report on violence, severe weather, or threats to life, property, and assets.

  • Coordinate emergency responses, including with law enforcement if required.

  • Verify incident information accuracy through secondary sources.

  • Generate heatmaps to highlight affected areas during significant events.

  • Collaborate with security and operational teams for a coordinated response.

  • Implement incident containment and mitigation strategies.

  • Document incident details, response actions, and lessons learned.

  • Follow SOPs, MOPs, Runbooks, and Playbooks.
     

Physical Security and Safety

The analyst monitors access control systems, CCTV, and safety-related alarms (e.g., fire, electrical, leaks). Responsibilities include reviewing footage, responding to security anomalies, and reporting incidents to security engineering teams while ensuring compliance with safety procedures

  • Monitor Closed-Circuit Television (CCTV) and Access Control Systems (ACS).

  • Track alarms for safety events including electrical issues, fire hazards, equipment failures, and water leaks.

  • Review camera footage for quality and area coverage.

  • Investigate and report access control incidents.

  • Report findings to the Security and Safety Engineering teams.

  • Follow SOPs, MOPs, Runbooks, and Playbooks.

  • Familiarity with Lenel and Genetec systems.
     

Cloud Incident Response and Monitoring

As hybrid environments become more critical to business operations, IRC Analysts will be expected to monitor and support both on-premises infrastructure and cloud-based systems. Analysts will assist in identifying and responding to cloud-related incidents across platforms such as AWS, GCP, and Azure. Responsibilities include:

  • Real-time monitoring of cloud infrastructure using tools such as AWS CloudWatch, Azure Monitor, and GCP Stackdriver.

  • Incident triage and escalation of alerts related to cloud-based services and resources (e.g., compute, storage, networking).

  • Coordination with Cloud Engineers and DevOps teams during cross-environment incidents to ensure rapid resolution and clear communications.

  • Identification and classification of cloud service anomalies, including misconfigurations, degraded services, and unauthorized access attempts.

  • Understanding of cloud-native architectures such as virtual private clouds (VPC), IAM, container orchestration (e.g., Kubernetes), and serverless functions.

  • Documentation of root cause analysis (RCA) and corrective actions for cloud incidents, feeding back into playbooks and runbooks.

  • Basic scripting and automation skills (Python, Bash, or PowerShell) for incident analysis and tooling.

  • Awareness of cloud security protocols, including encryption, IAM policies, and compliance standards like ISO 27001 and SOC 2.


Qualifications

Required Qualifications / Soft Skills 

  • 2+ years of experience in a NOC, command center, or similar 24/7 operations environment

  • Ability to quickly triage and prioritize multiple incidents based on risk

  • Knowledge of systems including IP Networks, DC Environment, and Server Health

  • Strong written and verbal communication skills

  • Works well under pressure and within deadlines

  • Excellent communication and collaboration abilities

  • Strong analytical and problem-solving skills

  • Ability to work independently and as part of a team

  • Familiarity with data protection laws such as GDPR

  • This is an on-site role at client facilities

  • Must be willing to work variable shifts, including nights, weekends, and holidays
     

Preferred Qualifications

  • Degree in Information Technology

  • Networking knowledge (IP, DNS, load balancing)

  • Experience with Grafana, ticketing systems, and DC infrastructure.

  • Certifications such as CompTIA Server+ or Schneider Electric DCCA

  • Experience with Lenel, Genetec, or Avigilon systems is a plus

  • Proficiency with programming/scripting tools

Salary Range

$72,960.00 - $115,200.00 USD (Salary)
  • Please note that the salary information provided herein is base pay only (gross); it does not include other forms of compensation which may or may not apply to this specific position, namely, performance-based bonuses, benefits-related payments, or other general incentives - none of which are guaranteed, may be subject to specific eligibility requirements, and are wholly within the discretion of Astreya to remit.
  • Further, the salary information noted above is a range that consists of a minimum and maximum rate of pay for this specific position. Where an applicant or employee is placed on this range will depend and be contingent on objective, documented work-related considerations like education, experience, certifications, licenses, preferred qualifications, among other factors.

Astreya offers comprehensive benefits to all Regular, Full-Time Employees, including:

  • Medical provided through UHC (PPO, HSA, Surest options) / Medical provided through Kaiser (HMO option only) for California employees only

  • Dental provided through UHC

  • Nationwide Vision provided by UHC

  • Flexible Spending Account for Health & Dependent Care

  • Pre-Tax Account for Commuter Benefit/Parking & Transit (location-specific)

  • Continuing Education and Professional Development via various integrated platforms, e.g. Udemy and Coursera

  • Corporate Wellness Program provided by Goomi Group

  • Employee Assistance Program

  • Wellness Days

    401k Plan

  • Basic and Supplemental Life Insurance

  • Short Term & Long Term Disability

  • Critical Illness, Critical Hospital, and Voluntary Accident Insurance

  • Tuition Reimbursement (available 6 months after start date, capped)

  • Paid Time Off (accrued and prorated, maximum of 120 hours annually)

  • Paid Holidays

  • Any other statutory leaves, paid time, or other ancillary benefits required under state and federal law

HQ

Astreya San Francisco, California, USA Office

655 Montgomery St, STE 490 DPT #17117, San Francisco, California, United States, 94111

Astreya San Jose, California, USA Office

2033 Gateway Pl, Ste 500, , , San Jose, California , United States, 95110

Similar Jobs

24 Days Ago
In-Office
San Jose, CA, USA
73K-115K Annually
Junior
73K-115K Annually
Junior
Information Technology
The IRC Analyst is responsible for incident management, monitoring infrastructure, responding to alerts, conducting investigations, and ensuring operational integrity across data center environments.
Top Skills: Aws CloudwatchAzure MonitorBashGcp StackdriverGenetecLenelPowershell)Programming/Scripting Tools (Python
12 Days Ago
In-Office
San Jose, CA, USA
73K-115K Annually
Junior
73K-115K Annually
Junior
Information Technology
Monitor and triage infrastructure, cloud, and physical-security alerts; lead incident lifecycle management and RCA; coordinate responders, maintain ticketing records, and follow SOPs, runbooks, and playbooks in a 24/7 on-site operations center.
Top Skills: AcsAvigilonAws CloudwatchAzure MonitorBashBmsCctvDcimDnsEverbridge Visual Command Center (Vcc)Gcp StackdriverGenetecGrafanaIamInternationalsosIp NetworksKubernetesLenelLoad BalancingPowershellPythonSaosServerlessTicketing SystemsVpc
5 Minutes Ago
Remote or Hybrid
California, USA
115K-222K Annually
Mid level
115K-222K Annually
Mid level
Artificial Intelligence • Healthtech • Machine Learning • Natural Language Processing • Biotech • Pharmaceutical
The Dermatology Senior Health and Science Specialist manages business relationships, promotes products, and engages customer accounts, leveraging strong sales and product knowledge.
Top Skills: Digital ToolsMS OfficeMulti-PlatformsVeeva EngageZoom

What you need to know about the San Francisco Tech Scene

San Francisco and the surrounding Bay Area attracts more startup funding than any other region in the world. Home to Stanford University and UC Berkeley, leading VC firms and several of the world’s most valuable companies, the Bay Area is the place to go for anyone looking to make it big in the tech industry. That said, San Francisco has a lot to offer beyond technology thanks to a thriving art and music scene, excellent food and a short drive to several of the country’s most beautiful recreational areas.

Key Facts About San Francisco Tech

  • Number of Tech Workers: 365,500; 13.9% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Google, Apple, Salesforce, Meta
  • Key Industries: Artificial intelligence, cloud computing, fintech, consumer technology, software
  • Funding Landscape: $50.5 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Sequoia Capital, Andreessen Horowitz, Bessemer Venture Partners, Greylock Partners, Khosla Ventures, Kleiner Perkins
  • Research Centers and Universities: Stanford University; University of California, Berkeley; University of San Francisco; Santa Clara University; Ames Research Center; Center for AI Safety; California Institute for Regenerative Medicine

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account