630 Helpdesk Management jobs in Singapore
Incident Management Engineer
Posted today
Job Viewed
Job Description
A World-Changing Company
Palantir builds the world’s leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.
The Role
Incident Management Engineers (IMEs) are the driving forces of stability across Palantir’s products. IMEs help to ensure Palantir fixes critical issues immediately. When something goes wrong, IMEs are the first to respond and are responsible for triaging, troubleshooting, and coordinating the resolution of the issue.
You’ll be a member of a centralized team responsible for managing the most critical outages. You are an excellent communicator, collaborator, and troubleshooter and can use both of these skills in fast-paced and high-stakes environments. You are able to parse technical details quickly and know when to ask for help when you need it.
Whatever the issue is, you are ensuring it gets resolved at a high bar as quickly and seamlessly as possible.
Core Responsibilities
Develop a deep understanding of Palantir’s product and delivery ecosystem.
Collaborate with customer-facing, product, and infrastructure teams on the development and deployment of scalable, reliable software for our customers.
Diagnose, resolve, and prevent issues encountered in the field.
Reduce the operational overhead of responding to critical incidents at Palantir through investments in tooling, process, and automation.
Take part in a 24/7 on-call rotation responsible for coordinating Palantir’s response to mission-critical incidents, ensuring efficient resolution with minimal customer impact.
What We Value
Excellent problem solving skills.
Comfort working in a fast paced environment.
Ability to work both independently and make decisions under minimal direction, as well as collaborate as part of a team.
Experience with scripting, automation, or data analysis a plus.
What We Require
Background in Computer Science, Engineering, Information Systems, or other technical field.
Willingness and interest to travel to other Palantir locations as needed.
Life at Palantir
We want every Palantirian to achieve their best outcomes, that’s why we celebrate individuals’ strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians’ lives is just one of the ways we’re investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region.
In keeping consistent with Palantir’s values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the city and or country in which you are employed. If the posting is specified as Onsite, you are required to work from an office.
If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process, please reach out and let us know how we can help.
#J-18808-Ljbffr
AVP- IT Incident Management
Posted today
Job Viewed
Job Description
Job Description:
We are seeking an experienced and results-driven Incident Manager to oversee and lead incident management processes. To ensure timely resolution of incidents, coordinate effectively across teams, and implement best practices to minimize disruptions to business operations. This role requires strong expertise in incident management, clear communication skills.
Incident Management
- Oversee the end-to-end incident lifecycle, from identification and logging to resolution and closure with technical teams, vendors, and stakeholders.
- Drive Root Cause Analysis (RCA) for critical incidents and ensure appropriate follow-ups.
- Develop and maintain incident management dashboards, metrics, and reports for senior leadership.
- Facilitate discussions within the recovery team, promoting engagement and maintaining discipline.
- Ability to translate technical incidents into business terms.
Process Improvement and SLA
- Continuously refine and enhance incident management processes to ensure efficiency and effectiveness.
- Identify trends and recurring issues, recommending proactive measures to prevent future incidents.
- Lead or contribute to training sessions and knowledge-sharing initiatives on incident management practices.
- Monitor and ensure adherence to Service Level Agreements (SLAs) for incident resolution.
- Proactively escalate and address SLA breaches with appropriate corrective actions.
Communication
- Ensure timely and clear communication of incident updates to stakeholders, including senior management and end users.
- Draft and distribute incident notifications, status updates, and post-incident reports.
- Bridge communication between technical teams and non-technical stakeholders to provide clarity and context.
Stakeholder and User Engagement
- Collaborate closely with business users to understand their needs and minimize incident impact on operations.
- Support Japanese-speaking stakeholders, ensuring language and cultural alignment.
- Act as the liaison between Singapore, Japan-based teams, and global and regional IT units during incident management.
Job Requirements:
- Tertiary degree in technology from a recognized educational institution.
- Strong understanding of ITIL processes; ITIL certification is highly preferred
- 6–8 years of experience in IT incident management or related roles in banking industry, with at least 2–3 years in a leadership capacity.
- Proven experience managing critical incidents and working with international teams, including Japanese-speaking stakeholders.
- Experience in IT Service Management, IT Operations, IT infrastructure, or Production Support.
- Good understanding of Service Desk Operations, Escalation Management, Stakeholder Management experience including different (e.g. ServiceNow, JIRA and Salesforce) ticketing tools knowledge.
- Strong decision-making, problem-solving abilities under pressure, prioritize and multitask effectively.
- Excellent interpersonal skills to foster collaboration across teams and regions.
Manager (Audit and Incident Management)
Posted today
Job Viewed
Job Description
Military Security Department
Permanent
What the role is
As a cyber auditor in our team, you will be responsible for conducting comprehensive security assessments, and compliance reviews. You will work with cross-functional teams to implement security best practices and help build our cyber resilience.
What you will be working on
You will plan and execute security audits across network infrastructure, applications, and systems, to assess compliance with industry standards. Following, you will document findings, prioritise vulnerabilities, and recommend remediation strategies. You will also develop and maintain audit frameworks, and security testing methodologies. You will also collaborate with IT and development teams to implement security improvements and support the organization with incident response actions and post incident assessment activities.
What we are looking for
You should have a tertiary education in an IT-related discipline, preferably with a focus on cyber-security. You should possess good writing and verbal communication skills, problem-solving and analytical skills. A passion for IT/cyber is essential. Cyber-security professional accreditation such as CISSP, CISA, CEH, and prior relevant work experience in cyber/IT related fields would be advantageous.
About Military Security Department
The Military Security Department (MSD)'s core business is in Counter Intelligence and internal security for MINDEF/SAF. MSD was formed in 1975 to counter the threats of espionage, subversion and sabotage against MINDEF/SAF. It began with two main entities, namely the Counter Intelligence Branch (CIB) and Field Security Branch (FSB). Over the years, the department has continued to evolve and our roles expanded in tandem with the changing security environment. Today, our roles also include Counter Terrorism and Cyber Security.
About your application process
If you do not hear from us within 4 weeks of the job ad closing date, we seek your understanding that it is likely that we are not moving forward with your application for this role. We thank you for your interest and would like to assure you that this does not affect your other job applications with the Public Service. We encourage you to explore and for other roles within Military Security Department or the wider Public Service.
Technology Support III, Incident Management
Posted today
Job Viewed
Job Description
JOB DESCRIPTION
Propel operational success with your expertise in technology support and a commitment to continuous improvement.
As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms' infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.
Job responsibilities
- Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
- Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
- Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.
- Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
- Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
- Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
- Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
- Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required qualifications, capabilities, and skills
- Bachelor's Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
- 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
- Demonstrated command and control, documentation, and communication skills in previous roles.
- Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
- Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
- Strong understanding of the ITIL framework and experience with incident management tools.
- Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
- High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
- Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.
- Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
- Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred qualifications, capabilities, and skills
- ITIL Certification.
- Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
- Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
ABOUT US
J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world's most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants' and employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
ABOUT THE TEAM
Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we're setting our businesses, clients, customers and employees up for success.
Technology Support III, Incident Management
Posted today
Job Viewed
Job Description
Propel operational success with your expertise in technology support and a commitment to continuous improvement.
As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms' infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.
Job responsibilities
• Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
• Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
• Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.
• Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
• Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
• Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
• Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
• Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required qualifications, capabilities, and skills
• Bachelor's Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
• 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
• Demonstrated command and control, documentation, and communication skills in previous roles.
• Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
• Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
• Strong understanding of the ITIL framework and experience with incident management tools.
• Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
• High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
• Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.
• Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
• Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred qualifications, capabilities, and skills
• ITIL Certification.
• Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
• Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
To apply for this position, please use the following URL:
Tell employers what skills you havecustomer mindset
Incident Command
Trust
Collaborative
Hardware
Defense
Identifying risks
Documentation Skills
Root Cause Analysis
Achieving Results
Penetration Testing
Cultural Diversity
Pressure
Operating Systems
Data Science
ITIL
Team Player
Stakeholder Management
Team Work
Incident Management
Manager (Facility Clearance, Consultancy, and Incident Management)
Posted today
Job Viewed
Job Description
Military Security Department
Permanent
What the role is
In this dynamic position, you will evaluate both physical-cyber security measures across client facilities, identifying weaknesses in their security posture and recommending remediation. This role bridges the gap between physical security controls and cybersecurity defences to create holistic protection strategies.
What you will be working on
You will conduct thorough on-site security assessments of client facilities, examining physical measures to protect network and IT infrastructure, and evaluate cyber-physical control systems. You will assist clients by performing gap analysis against authority standards and regulatory requirements and develop reports with prioritized findings and actionable recommendations. You will be called on to create customized security roadmaps and implementation plans for clients, communicate with stakeholders explaining security vulnerabilities and proposed solutions, and support the organization with incident response actions and post-breach assessment activities.
What we are looking for
You should have a tertiary education in an IT-related discipline, preferably with a focus on cyber-security. You should possess good writing and verbal communication skills, problem-solving and analytical skills. A passion for IT/cyber is essential. Cyber-security professional accreditation such as CISSP, and prior relevant work experience in cyber/IT related fields would be advantageous.
About Military Security Department
The Military Security Department (MSD)'s core business is in Counter Intelligence and internal security for MINDEF/SAF. MSD was formed in 1975 to counter the threats of espionage, subversion and sabotage against MINDEF/SAF. It began with two main entities, namely the Counter Intelligence Branch (CIB) and Field Security Branch (FSB). Over the years, the department has continued to evolve and our roles expanded in tandem with the changing security environment. Today, our roles also include Counter Terrorism and Cyber Security.
About your application process
If you do not hear from us within 4 weeks of the job ad closing date, we seek your understanding that it is likely that we are not moving forward with your application for this role. We thank you for your interest and would like to assure you that this does not affect your other job applications with the Public Service. We encourage you to explore and for other roles within Military Security Department or the wider Public Service.
Technology Support III, Incident Management & Response (IMR)
Posted today
Job Viewed
Job Description
Job Overview
Propel operational success with your expertise in technology support and a commitment to continuous improvement. As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firm’s infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities).
Job Responsibilities
Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm’s infrastructure.
Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required Qualifications
Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
Demonstrated command and control, documentation, and communication skills in previous roles.
Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
Strong understanding of the ITIL framework and experience with incident management tools.
Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
Ability to exercise excellent judgment and decision-making skills under pressure and know when to elevate issues.
Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred Qualifications
ITIL Certification.
Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
About Us
J.P. Morgan is a global leader in financial services, providing strategic advice and products to the world’s most prominent corporations, governments, wealthy individuals and institutional investors. Our first-class business in a first-class way approach to serving clients drives everything we do. We strive to build trusted, long-term partnerships to help our clients achieve their business objectives.
We recognize that our people are our strength and the diverse talents they bring to our global workforce are directly linked to our success. We are an equal opportunity employer and place a high value on diversity and inclusion at our company. We do not discriminate on the basis of any protected attribute, including race, religion, color, national origin, gender, sexual orientation, gender identity, gender expression, age, marital or veteran status, pregnancy or disability, or any other basis protected under applicable law. We also make reasonable accommodations for applicants’ and employees’ religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation.
About the Team
Our professionals in our Corporate Functions cover a diverse range of areas from finance and risk to human resources and marketing. Our corporate teams are an essential part of our company, ensuring that we’re setting our businesses, clients, customers and employees up for success.
#J-18808-Ljbffr
Be The First To Know
About the latest Helpdesk management Jobs in Singapore !
Technology Support III, Incident Management & Response (IMR)
Posted 9 days ago
Job Viewed
Job Description
Propel operational success with your expertise in technology support and a commitment to continuous improvement.
As a Technology Support III team member in Cybersecurity & Tech Controls, you will fit into a Global team providing 24/7 Incident Management and Response support, acting as the frontline defense for attacks against the firms’ infrastructure. You will be responsible for the execution of the Firm-wide Cybersecurity Incident Management Playbook designed to provide a set of steps to orchestrate a framework of actions to be considered during the lifecycle of a Cybersecurity event, in effort to prevent impact, or during an impacting Cybersecurity incident. The process executes against the firmwide Technology incident Management Standards and leverages ITIL best practices to govern remediation and safeguard failures. The team also covers internal and external engagements with our LOB partners including regulatory, compliance, privacy and/or media communications. Our incidents are categorized: technical outages (e.g. hardware failures, code/configuration issues, DB corruption, access issues, etc.); and cybersecurity events (e.g. malware, credential high jacking, zero-day vulnerabilities.
Job responsibilities
• Serve as a key member of the Cybersecurity & Technology Controls (CTC) Incident Management & Response (IMR) team within the Global Incident Command Center (GICC), providing 24/7 support for incident management and response.
• Execute the Firm-wide Cybersecurity Incident Management Playbook to orchestrate actions during the lifecycle of cybersecurity events, aiming to prevent or mitigate impacts.
• Act as the frontline defense for cybersecurity incidents, ensuring effective and timely resolution of security issues against the firm's infrastructure.
• Collaborate with internal and external partners, including regulatory, compliance, privacy, and media communications teams, to manage incidents.
• Utilize command and control, communication, and documentation skills to ensure the stability, capacity, and resiliency of products.
• Work closely with Cybersecurity Operations Incident Response teams and Enterprise Technology Product and Engineering teams to mitigate and remediate events and incidents.
• Analyze operational metrics to identify process improvements and deliver constructive feedback to the team.
• Engage in continuous improvement of practices and processes, and participate in research, internal procedure uplift, and internal tools development.
Required qualifications, capabilities, and skills
• Bachelor’s Degree in Computer Science, Cybersecurity, Data Science, or related disciplines
• 3+ years of experience in an Incident Management or Incident Response function in an enterprise environment.
• Demonstrated command and control, documentation, and communication skills in previous roles.
• Experience communicating technical topics both in writing and verbally to senior management from technical and non-technical backgrounds.
• Ability to work closely with business, technology, and project management partners to execute projects and improvements for the CTC IMR team.
• Strong understanding of the ITIL framework and experience with incident management tools.
• Basic understanding of various operating systems, network fundamentals, cyber tools, and cloud architecture.
• High-level understanding of cybersecurity attack frameworks, such as MITRE ATT&CK and Cyber Kill Chain.
• Ability to exercise excellent judgment and decision-making skills under pressure and know when to escalate issues.
• Ability to influence senior technology managers across organizational boundaries through formal and informal channels.
• Proactive with a strong bias for action, naturally inquisitive, and committed to continuous improvement.
Preferred qualifications, capabilities, and skills
• ITIL Certification.
• Baseline cybersecurity certifications, such as Security+ or Google Cybersecurity Certificate.
• Appreciation of the wider roles of interconnecting cybersecurity teams and collaboration with teams like Forensics, Threat Intelligence, Penetration Testing, and Vulnerability Management.
To apply for this position, please use the following URL:
Data Center Ops Analyst , Incident Management (Loyang) (ID: 679000)
Posted today
Job Viewed
Job Description
Your Role
This role is responsible for the day-to-day monitoring of network and infrastructure operations. You will deliver excellent customer service, troubleshoot issues, and escalate incidents for internal and external stakeholders contacting the Global Command Center. This is a shift-based role, requiring flexibility for rotating schedules.
What You'll Do
- Work a 12-hour morning shift on a rotating schedule.
- Deliver Tier I network support and customer service for mission-critical, 24/7 Data Centers.
- Participate in a weekly on-call rotation supporting 24/7 operations.
- Provide both proactive and reactive assistance to external customers.
- Support the network environment—logging unfamiliar issues, owning resolution efforts, or escalating as required.
- Receive, triage, and respond to incoming phone calls, emails, and portal tickets from internal and external users.
- Detect and analyze alarms to perform basic fault isolation and troubleshooting; escalate to Tier II, Tier III, or management when needed.
- Generate and publish incident, maintenance, and advisory notifications for internal and external stakeholders at site or regional levels.
- Prioritize tasks to meet defined KPIs and service-level commitments.
- Maintain clear, effective communication with Tier II, Tier III, and management for urgent or high-priority cases.
- Document incidents, maintenance, and problem details in real-time.
- Ensure customer SLAs are consistently met.
- Maintain current knowledge through training—both internal and external—as well as continued education and professional development.
What You'll Need
- Minimum 1 year of experience in a 24/7 Network Operations Center, Contact Center, or equivalent environment.
- At least 1 year of customer service or technical support experience (or equivalent).
- Strong written and verbal communication skills for both colleagues and customers.
- Ability to multi-task and effectively prioritize responsibilities.
- 12 hours fixed shift based role, 7am to 7pm (including weekends, public holiday) with 3-4 days working pattern.
Interested candidates who wish to apply for the advertised position, please click on "Apply". We regret that only shortlisted candidates will be notified.
EA License No.: 01C4394 (PERSOLKELLY Singapore PTE LTD)
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOL Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.
Data Center Ops Analyst , Incident Management (Loyang) (ID: 679000)
Posted today
Job Viewed
Job Description
Your Role
This role is responsible for the day-to-day monitoring of network and infrastructure operations. You will deliver excellent customer service, troubleshoot issues, and escalate incidents for internal and external stakeholders contacting the Global Command Center. This is a shift-based role, requiring flexibility for rotating schedules.
What You'll Do
- Work a 12-hour morning shift on a rotating schedule.
- Deliver Tier I network support and customer service for mission-critical, 24/7 Data Centers.
- Participate in a weekly on-call rotation supporting 24/7 operations.
- Provide both proactive and reactive assistance to external customers.
- Support the network environment—logging unfamiliar issues, owning resolution efforts, or escalating as required.
- Receive, triage, and respond to incoming phone calls, emails, and portal tickets from internal and external users.
- Detect and analyze alarms to perform basic fault isolation and troubleshooting; escalate to Tier II, Tier III, or management when needed.
- Generate and publish incident, maintenance, and advisory notifications for internal and external stakeholders at site or regional levels.
- Prioritize tasks to meet defined KPIs and service-level commitments.
- Maintain clear, effective communication with Tier II, Tier III, and management for urgent or high-priority cases.
- Document incidents, maintenance, and problem details in real-time.
- Ensure customer SLAs are consistently met.
- Maintain current knowledge through training—both internal and external—as well as continued education and professional development.
What You'll Need
- Minimum 1 year of experience in a 24/7 Network Operations Center, Contact Center, or equivalent environment.
- At least 1 year of customer service or technical support experience (or equivalent).
- Strong written and verbal communication skills for both colleagues and customers.
- Ability to multi-task and effectively prioritize responsibilities.
- 12 hours fixed shift based role, 7am to 7pm (including weekends, public holiday) with 3-4 days working pattern.
Interested candidates who wish to apply for the advertised position, please click on "Apply". We regret that only shortlisted candidates will be notified.
EA License No.: 01C4394 (PERSOLKELLY Singapore PTE LTD)
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOL Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.