The Operations Technician II role is ideal for someone who's not only technically skilled but also thrives on solving complex challenges and finding innovative solutions. You'll be at the center of activity, applying your technical expertise to keep systems running efficiently while continuously growing your skills.
Requirements
- Install, configure, and maintain servers, storage devices, and network equipment.
- Perform hardware troubleshooting, diagnostics, and component replacements.
- Assist with rack/stack operations, cable management, and asset tracking with internal and/or external customers.
- Provide remote smart hands support for customer advanced issues/concerns.
- Assist Lead Operations Technician and/or Data Center Manager with other facility related tasks.
- Follow Method of Procedures (MOP) for equipment & cabling maintenance.
- Provide remote hands support for customer advanced issues/concerns.
- Monitor and respond to alerts related to power, cooling, and network performance.
- Conduct routine inspections and preventive maintenance to ensure system reliability.
- Work with vendors and internal teams to coordinate maintenance and repairs.
- Perform routine physical inspections for alarm identification and operational issues based on building and equipment checklists.
- Responsible for handling both incoming and outgoing shipments.
- Diagnose and resolve hardware, connectivity, and environmental issues.
- Escalate critical incidents to senior engineers or management as needed.
- Document root cause analysis and follow-up actions for recurring issues.
- Serve as technical escalation point for other team members.
- Proactively manage ticket queue for timely request response and completion.
- Adhere to data center security policies, standard operating procedures, access controls, and compliance requirements.
- Escort and supervise third-party vendors and visitors when required.
- Maintain accurate records of equipment changes, incidents, and maintenance activities.
- Monitor security cameras.
- Provide security oversight and administration based on company standards through security control program, policies, and procedures.