Demo

Incident Response Analyst

Astreya
San Jose, CA Full Time
POSTED ON 4/25/2025
AVAILABLE BEFORE 8/22/2025

Company Overview

Astreya Partners is a leading IT solutions provider, supporting some of the most recognizable and innovative organizations globally. Established in 2001 in Silicon Valley, we have expanded our reach to 33 countries with over 1300 IT professionals dedicated to enabling businesses to make informed decisions and achieve operational efficiency.

Summary

The IRC (Incident Response Center) is the first layer of defense responsible for quick detection and incident response using various monitoring and automation tools, conducting thorough investigation of alerts, classification, and triage. The IRC Analyst is responsible for delivering operations within the IRC across all client data center sites globally. IRC analysts are expected to respond to all alarms/alerts set in the data center environment, including Infrastructure Management (DCIM), Server Automation Operations System (SAOS), CCTV, Access Control Systems (ACS), and Building Management Systems (BMS), providing deep understanding and intelligence of the criticality and impact of incidents to resolver groups.

Responsibilities
Incident & Problem Management

Analysts are responsible for the full lifecycle of incident management, from detection through to resolution and root cause analysis (RCA). This includes acting as incident commanders, maintaining SLAs, documenting actions, and providing insights to support continuous improvement efforts across teams and systems.

  • Investigate, report, and respond to alerts, incident response (war room, remote bridges).
  • Respond to incidents and critical situations in a calm, problem-solving manner, and conduct in-depth investigation of alerts.
  • Be the first line of defense using monitoring and automation tools to conduct investigation, classification, and triage, all within prescribed SLAs.
  • Provide deep understanding and intelligence of incident criticality and impact to resolver groups.
  • Ensure detailed records of alarm handling activities, including actions taken and resolutions in ticketing tools; file incident reports.
  • Act as incident commander during major incidents.
  • Understand internal/external communication methods and stakeholder responsibilities.
  • Support program managers and facilitate project deliverables, improving operational and engineering initiatives.
  • Conduct root cause analysis (RCA) to determine recurring problems.
  • Use in-depth questioning and analysis to determine the underlying cause of incidents or problems (Who, What, Where, When, Why).
  • Perform duties in compliance with SOPs, MOPs, Runbooks, and Playbooks.

Server, DCIM, Network and Traffic Alarms Operations

This function involves real-time monitoring of infrastructure alarms, determining the severity of alerts, escalating appropriately, and maintaining clear communications with resolver teams. It ensures uptime and system integrity across servers, network infrastructure, and environmental systems.

  • Continuously monitor alarm dashboards and systems.
  • Investigate and respond to alarms related to Network, Data Center Environment, Server Health, Facility Security, and Safety.
  • Identify and acknowledge incidents associated with alarms.
  • Assess incidents to determine their criticality and operational impact.
  • Engage resolver groups and escalate to higher tiers or management following established paths.
  • Maintain communication with teams, stakeholders, and incident responders.
  • Follow documented procedures to resolve incidents promptly and effectively.
  • Ensure accurate records of alarm handling and resolution activities in ticketing tools.
  • Comply with SOPs, MOPs, Runbooks, and Playbooks.

Threat Intelligence, Critical Event Management

Analysts monitor global threat feeds and operational alerts to protect personnel and assets.

Responsibilities include triaging alerts related to weather, security, travel, and regional instability, then coordinating appropriate response actions, escalating to law enforcement if necessary, and compiling response reports.

  • Monitor Everbridge Visual Command Center (VCC), InternationalSOS emails, and open-source tools for real-time incidents affecting assets and travellers.
  • Monitor tools or queries for specific stakeholder requests.
  • Report on violence, severe weather, or threats to life, property, and assets.
  • Coordinate emergency responses, including with law enforcement if required.
  • Verify incident information accuracy through secondary sources.
  • Generate heatmaps to highlight affected areas during significant events.
  • Collaborate with security and operational teams for a coordinated response.
  • Implement incident containment and mitigation strategies.
  • Document incident details, response actions, and lessons learned.
  • Follow SOPs, MOPs, Runbooks, and Playbooks.

Physical Security and Safety

The analyst monitors access control systems, CCTV, and safety-related alarms (e.g., fire, electrical, leaks). Responsibilities include reviewing footage, responding to security anomalies, and reporting incidents to security engineering teams while ensuring compliance with safety procedures

  • Monitor Closed-Circuit Television (CCTV) and Access Control Systems (ACS).
  • Track alarms for safety events including electrical issues, fire hazards, equipment failures, and water leaks.
  • Review camera footage for quality and area coverage.
  • Investigate and report access control incidents.
  • Report findings to the Security and Safety Engineering teams.
  • Follow SOPs, MOPs, Runbooks, and Playbooks.
  • Familiarity with Lenel and Genetec systems.

Cloud Incident Response and Monitoring

As hybrid environments become more critical to business operations, IRC Analysts will be expected to monitor and support both on-premises infrastructure and cloud-based systems. Analysts will assist in identifying and responding to cloud-related incidents across platforms such as AWS, GCP, and Azure. Responsibilities include:

  • Real-time monitoring of cloud infrastructure using tools such as AWS CloudWatch, Azure Monitor, and GCP Stackdriver.
  • Incident triage and escalation of alerts related to cloud-based services and resources (e.g., compute, storage, networking).
  • Coordination with Cloud Engineers and DevOps teams during cross-environment incidents to ensure rapid resolution and clear communications.
  • Identification and classification of cloud service anomalies, including misconfigurations, degraded services, and unauthorized access attempts.
  • Understanding of cloud-native architectures such as virtual private clouds (VPC), IAM, container orchestration (e.g., Kubernetes), and serverless functions.
  • Documentation of root cause analysis (RCA) and corrective actions for cloud incidents, feeding back into playbooks and runbooks.
  • Basic scripting and automation skills (Python, Bash, or PowerShell) for incident analysis and tooling.
  • Awareness of cloud security protocols, including encryption, IAM policies, and compliance standards like ISO 27001 and SOC 2.

QualificationsRequired Qualifications / Soft Skills

  • 2 years of experience in a NOC, command center, or similar 24/7 operations environment
  • Ability to quickly triage and prioritize multiple incidents based on risk
  • Knowledge of systems including IP Networks, DC Environment, and Server Health
  • Strong written and verbal communication skills
  • Works well under pressure and within deadlines
  • Excellent communication and collaboration abilities
  • Strong analytical and problem-solving skills
  • Ability to work independently and as part of a team
  • Familiarity with data protection laws such as GDPR
  • This is an on-site role at client facilities
  • Must be willing to work variable shifts, including nights, weekends, and holidays

Preferred Qualifications

  • Degree in Information Technology
  • Networking knowledge (IP, DNS, load balancing)
  • Experience with Grafana, ticketing systems, and DC infrastructure.
  • Certifications such as CompTIA Server or Schneider Electric DCCA
  • Experience with Lenel, Genetec, or Avigilon systems is a plus
  • Proficiency with programming/scripting tools

Job Type: Full-time

Pay: $70,000.00 - $75,000.00 per year

Compensation Package:

  • Yearly pay

Work Location: In person

Salary : $70,000 - $75,000

If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Incident Response Analyst?

Sign up to receive alerts about other jobs on the Incident Response Analyst career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$87,466 - $114,731
Income Estimation: 
$114,790 - $146,930
Income Estimation: 
$115,647 - $153,495
Income Estimation: 
$87,466 - $114,731
Income Estimation: 
$114,790 - $146,930
Income Estimation: 
$115,647 - $153,495
Income Estimation: 
$114,790 - $146,930
Income Estimation: 
$142,618 - $183,267
Income Estimation: 
$115,647 - $153,495
Income Estimation: 
$152,958 - $200,151
Income Estimation: 
$186,685 - $265,377
Income Estimation: 
$71,440 - $92,105
Income Estimation: 
$87,466 - $114,731
Income Estimation: 
$115,647 - $153,495
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at Astreya

Astreya
Hired Organization Address Denver, CO Full Time
What this Job Entails : The Service Desk Specialist IV will support one of Astreya's key clients. The role will be respo...
Astreya
Hired Organization Address Seattle, WA Full Time
Company Description: · As discussed, Astreya is the leading IT engineering solutions provider for some of the world's mo...
Astreya
Hired Organization Address Denver, CO Full Time
What this Job Entails : We are looking for an entry level Data Analyst to join our growing team of analytics experts. Th...
Astreya
Hired Organization Address Sonoma, CA Full Time
About Astreya : Astreya is the leading IT engineering solutions provider for some of the world's most recognizable and i...

Not the job you're looking for? Here are some other Incident Response Analyst jobs in the San Jose, CA area that may be a better fit.

Principal Incident Response Analyst

Atlassian, Mountain View, CA

AI Assistant is available now!

Feel free to start your new journey!