Network Operations Specialist - 3rd Shift
Role details
Job location
Tech stack
Job description
As a Network Operations Specialist at TQL, you'll be on the front lines of IT Operations, ensuring the stability, performance and visibility of our enterprise technology environment. You'll monitor a diverse set of systems - including infrastructure, applications, cloud services and network connectivity - while triaging incidents, leading response efforts and continuously improving our monitoring and alerting practices. This role is ideal for someone who thrives in high-pressure situations, enjoys solving complex problems and is passionate about operational excellence., * Monitor infrastructure, applications, cloud services (e.g., Azure) and network connectivity using tools like Datadog, SolarWinds and PRTG.
- Perform initial triage of alerts and incidents, determine severity and escalate appropriately
- Serve as Incident Commander during high-priority incidents, managing conference bridges and coordinating cross-functional response
- Communicate clearly and consistently with stakeholders during incidents, including IT leadership and business units
- Maintain and improve runbooks, knowledge base articles (ServiceNow KB) and standard operating procedures
- Analyze incident and alert data to identify trends, reduce noise and improve signal accuracy
- Participate in weekly incident reviews and post-incident analysis to drive operational improvements
- Collaborate with infrastructure, cloud and development teams to ensure new services are properly monitored
- Support change management processes by reviewing change requests, assessing operational risk and coordinating NOC readiness for planned changes
- Recommend enhancements to alerting logic, thresholds and observability standards
- Contribute to automation initiatives that reduce manual intervention and improve response times, Employment visa sponsorship is unavailable for this position. Applicants requiring employment visa sponsorship now or in the future (e.g., F-1 STEM OPT, H-1B, TN, J1 etc.) will not be considered.
Requirements
- Associate degree in IT, Computer Science or equivalent experience (Bachelor's preferred)
- 2+ years of experience in IT operations, system monitoring or incident response in an enterprise environment
- Demonstrated ownership of incident management, including leading high-severity incidents and coordinating cross-functional response
- Proficiency with enterprise monitoring platforms (Datadog, SolarWinds, PRTG, Azure Monitor)
- Hands-on experience with ITSM platforms (ServiceNow required)
- Strong understanding of infrastructure and network fundamentals (TCP/IP, DNS, VPN, cloud services)
- Ability to analyze logs, metrics and alerts to identify root cause and recommend remediation
- Clear, confident communication in high-pressure scenarios; skilled in updates and documentation
- Scripting or automation experience is a bonus (e.g., PowerShell, Python); experience with incident notification tools (e.g., Everbridge, xMatters)
Benefits & conditions
-
$59,000-$80,000 base salary
-
Advancement opportunities with aggressive and structure career paths
-
A culture of continuous education and technical training with reimbursements available
-
Hybrid work environment with the ability to work remotely 40 hours per month
-
Comprehensive benefits package
-
Health, dental and vision coverage
-
401(k) with company match
-
Perks including employee discounts, financial wellness planning, tuition reimbursement and more
-
Certified Great Place to Work and voted a 2019-2026 Computerworld Best Places to Work in IT