What are the responsibilities and job description for the Information Technology Operations Engineer position at Lorven Technologies Inc.?
Job Title: Operations Technology Engineer
Location: Deerfield Beach, FL
Job Type: Long-term contract
Responsibilities
- Development capabilities (must have)
- Support hybrid environments spanning on‑prem and Azure infrastructure.
- A developer mindset with experience in Dev workflow, PowerShell, etc.
- Cloud-Native application development experience in architecting, building, and deploying applications within AWS or Azure, leveraging cloud-native services
- Demonstrated 'developer mindset' with the ability to take full ownership of the application lifecycle—from initial code design and CI/CD pipeline automation to proactive production support and iterative feature enhancement.
- Automation/ AI development experience (must have)
- Proficiency in leveraging Generative AI tools such as GitHub Co-pilot, ChatGPT, and Anthropic Claude
- Demonstrated ability to integrate AI-driven coding assistants
- Familiarity with utilizing AI platforms for the rapid prototyping of automation tools and maintaining comprehensive technical documentation
- Explore and apply AI‑assisted features within monitoring, event management, and SIEM tools to:
- Improve signal quality / reduce alert fatigue
- Support faster incident triage
- Contribute to documentation, run books, and operational improvements focused on small, incremental wins.
- Public cloud platforms (must have)
- Has experience with Azure and AWS cloud platforms. Have either directly supported or is familiar with Azure‑based monitoring and logging, including:
- Azure Monitor and Log Analytics integrations
- Observability for Azure‑hosted workloads
- Observability & Event Management (should have)
- Has experience with tools such as Data Dog and Dynatrace.
- The person will be responsible for collaborating with platform owners to support integrations, data quality, and alerting hygiene.
- Assist with event management workflows, ensuring alerts are actionable and routed correctly.
- Participate in efforts to reduce alert noise and repeat incidents.
Skills Must have
- 5 years of experience in software development or systems engineering, with a "developer-first" approach to building, instrumenting, and supporting scalable applications in public cloud environments
- Proficiency in integrating Generative AI tools (such as GitHub Co-pilot, ChatGPT, or Claude) into the development lifecycle
- Experience working in a modern Dev workflow using GitHub (branches, pull requests, code reviews, and CI/CD) to manage and deploy scripts/automation used for platform operations
- Working proficiency in scripting languages such as PowerShell, Python, BASH, or similar scripting languages.
- Knowledge of Azure, Azure Active Directory (AD), and hybrid cloud environments is a plus.
- Experience with observability or monitoring platforms, such as Solar Winds, Data Dog, Dynatrace, or similar tools.
- Exposure to public cloud environments, preferably Microsoft Azure or AWS
- Basic understanding of incident and event management practices, including alert triage, escalation, and collaboration with incident response or operations teams.
- Demonstrated willingness and ability to learn new technologies quickly, with examples of picking up new platforms, tools, or domains outside of prior core expertise.
- Familiarity with Agile or SAFe ways of working, including collaboration in sprint‑based delivery models and cross‑functional team engagement, is a plus.
- Strong communication and collaboration skills, with the ability to work effectively with platform owners, operations teams, security teams, and external stakeholders.
- Exposure to SIEM concepts or platforms such as Azure Sentinel, CRIBL, or similar is a plus.
- Experience with change management practices in an enterprise IT environment is beneficial.
Nice to have
- SIEM & Security platforms (nice to have)
- Has a working understanding of SIEM concepts and platforms such as Azure Sentinel and CRIBL.
- Support log ingestion, troubleshooting, and collaboration with security and incident‑response teams.
- Ensure infrastructure and network telemetry support security detection requirements.
Other responsibilities
- Participate in knowledge transfer activities related to platform transitions and retirements. Maintain documentation.
- Support on‑call or escalation rotations as needed.