Skip to main content
Full Timeentry
San Jose, California, USPosted March 19, 2026

Resume Keywords to Include

Make sure these keywords appear in your resume to improve ATS scoring

AWSGCPAzure

Sign up free to auto-tailor your resume with all these keywords and get a higher ATS score

Job Description

Summary

The Incident Response Center (IRC) acts as the first line of defense, responsible for rapid detection, initial assessment, and response to incidents using a range of monitoring and automation tools.

The L1 NOC Engineer role focuses on front-line monitoring, alert triage, and escalation across global data center environments. This position is responsible for identifying incidents, assessing their impact, and ensuring timely escalation to appropriate resolver teams while maintaining clear and accurate communication.

Responsibilities

Incident & Problem Management

  • Act as the first point of contact for incident detection and response.
  • Monitor, triage, and classify alerts within defined SLAs.
  • Escalate incidents to appropriate resolver teams based on severity and impact.
  • Support incident bridges and war room activities by providing accurate updates.
  • Maintain detailed and accurate records in ticketing systems.
  • Follow defined escalation paths and communication protocols.
  • Assist in post-incident reviews and root cause analysis (RCA) documentation.
  • Apply structured troubleshooting to gather key incident details (Who, What, Where, When, Why).
  • Adhere to SOPs, MOPs, runbooks, and playbooks.

Infrastructure & Alarm Monitoring Operations

  • Continuously monitor dashboards and alerting systems for infrastructure health.
  • Identify and acknowledge alarms across network, server, and data center environments.
  • Perform initial assessment of alerts to determine severity and impact.
  • Escalate issues promptly to L2/L3 teams or relevant stakeholders.
  • Maintain clear communication during incident handling.
  • Ensure all actions are logged accurately in ticketing systems.
  • Follow standard operating procedures for consistent response.

Threat Intelligence & Critical Event Monitoring

  • Monitor threat intelligence feeds and alerting platforms for potential risks.
  • Identify events such as severe weather, security threats, or regional disruptions.
  • Validate and report incidents using available tools and secondary sources.
  • Escalate critical events to appropriate internal teams.
  • Support coordination efforts during major incidents.
  • Document alerts, actions taken, and outcomes.
  • Follow established response procedures.

Physical Security & Safety Monitoring

  • Monitor CCTV and Access Control Systems for security alerts.
  • Respond to alarms related to safety events (fire, electrical, environmental).
  • Perform initial review of camera footage when required.
  • Identify and report anomalies or unauthorized access.
  • Escalate incidents to security and safety teams.
  • Ensure compliance with operational and safety procedures.

Cloud & Systems Monitoring Support

  • Monitor cloud and on-premise systems for alerts and anomalies.
  • Perform initial triage of cloud-related alerts (AWS, Azure, GCP).
  • Escalate issues affecting cloud services to relevant engineering teams.
  • Identify potential misconfigurations or service disruptions.
  • Assist in documenting incidents and updates.
  • Follow runbooks and playbooks for cloud incident response.

Qualifications

Required

  • 1–2+ years of experience in a NOC, command center, or monitoring environment
  • Strong ability to triage and prioritize alerts
  • Basic understanding of networks, servers, and data center operations
  • Good written and verbal communication skills
  • Ability to work under pressure in a fast-paced environment
  • Strong attention to detail and analytical thinking
  • Ability to follow processes and escalation procedures
  • Familiarity with data protection regulations (e.g., GDPR)
  • Willingness to work shifts, including nights, weekends, and holidays
  • On-site presence required

Preferred

  • Degree in Information Technology or related field
  • Basic networking knowledge (IP, DNS)
  • Experience with monitoring and ticketing tools
  • Exposure to data center or cloud environments
  • Familiarity with CCTV/ACS systems (e.g., Lenel, Genetec)
  • Basic scripting or automation knowledge

Package:

Up to $95,00 per annum.

401k Health & much more

Please apply below, the team will call you right away!

Want AI-powered job matching?

Upload your resume and get every job scored, your resume tailored, and hiring manager emails found - automatically.

Get Started Free