Search by job, company or skills

T

Network Management Services Engineer (Day-2 Operations)

4-6 Years
SGD 6,000 - 8,000 per month
new job description bg glownew job description bg glownew job description bg svg
  • Posted 6 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Role: Network Management Services Engineer (Day-2 Operations)

Location: Ang Mo Kio

Type of Role: Contract (12 months renewable)

Remuneration: Base Salary - $6,000 - $8,000

Renumeration: 1 month bonus upon completion of 12 months contract (subjected to attendance, performance etc..)

Service Objective

Provide secure, resilient, and continuously available enterprise network services through controlled Day-2 operations, ensuring service levels, security compliance, and operational readiness following formal handover from implementation teams.

Service Outcomes

The Network Management Service delivers the following measurable outcomes:

  • Stable and highly available network services aligned to agreed service levels.
  • Secure network posture enforced through access control, segmentation, and policy governance.
  • Predictable incident response and restoration through ITIL-aligned processes.
  • Controlled network changes with documented risk, approval, and validation.
  • Continuous visibility into network performance, utilization, and capacity risks.
  • Demonstrable compliance with patching, hardening, and audit requirements.

Service Scope(In Scope)

Network Operations and Administration

  • Day-to-day administration of enterprise network infrastructure after formal handover.
  • Continuous review of network logs, audit trails, and operational alerts.
  • Management of network access controls, authentication, authorization, and accounting.
  • IP address management, routing configuration administration, and network housekeeping.
  • Backup, restoration, and documentation of network configurations.
  • Maintenance of accurate network topology, configuration, and operational records.

Network Security Operations

  • Operation of network access control and posture validation mechanisms.
  • Enforcement of segmentation and controlled access workflows prior to service enablement.
  • Administration of firewall policies, access rules, and security configurations.
  • Review and analysis of security events, violations, and anomalous traffic patterns.
  • Recommendation and implementation of corrective and preventive security measures.

Incident, Problem, and Change Management

  • Network incident management aligned to defined service levels and escalation paths.
  • Root cause analysis and problem management for recurring or high-impact incidents.
  • Change planning, risk and impact assessment, approval coordination, and execution.
  • Post-change service verification to confirm network stability and functionality.
  • Coordination with third-party support providers where required, with operational ownership retained.

Network Maintenance and Lifecycle Management

  • Planned preventive and corrective maintenance with documented risk and impact assessments.
  • Graceful shutdown and startup of network equipment during approved maintenance windows.
  • On-site or remote standby support during infrastructure or facility maintenance activities.
  • Monitoring of hardware warranties, support contracts, and lifecycle milestones.
  • Proactive notification of upcoming renewals or end-of-support conditions.

Network Monitoring and Performance Management

  • Continuous monitoring of network availability, latency, utilization, and health indicators.
  • Threshold-based alerting and proactive response to performance degradation.
  • Traffic flow analysis to identify bottlenecks, underutilization, and growth trends.
  • Capacity and performance recommendations based on observed usage patterns.
  • Integration of monitoring outputs into incident and problem management workflows.

Automation

  • Automation of common and repeatable operational tasks where appropriate.
  • Automation must remain auditable, secure, and compliant with operational controls.
  • Automation shall not bypass approval, change, or security governance requirements.

Service Scope(Out of Scope)

  • Network architecture design or initial implementation activities.
  • Major technology refreshes or platform migrations unless separately commissioned.
  • Activities outside the defined scope without formal service request or change approval.

Service Controls and Governance

  • Services are delivered in alignment with ITIL practices, including Incident, Problem, Change, Configuration, and Knowledge Management.
  • All operational activities are subject to documented approvals, auditability, and evidence retention.
  • Security hardening and patch compliance are treated as mandatory operational controls.
  • Disputes on fault ownership shall be supported by logs, metrics, and documented analysis.

Service Reporting and Evidence

  • Monthly service reports covering:

o Network availability and service level performance.

o Incident volumes, response times, and resolution trends.

o Change activity and success rates.

o Security posture and compliance status.

  • Network utilization and performance analysis reports.
  • Patch, configuration, and access compliance evidence.
  • Ad-hoc reports provided upon request, subject to agreed timelines.

Supported Network Platforms and Technologies

The Network Management Service provides Day-2 operational support for the following network platforms and technologies. These define the minimum platform competency coverage required for service delivery.

Software-Defined Data Centre and Fabric Platforms

  • Cisco Application Centric Infrastructure (ACI)

o Nexus 9000 series spine, leaf, border, service, and copper leaf switches

o APIC controller clusters

o Fabric policy, tenant, VRF, endpoint group, and contract operations

  • Storage Area Network (SAN) Switching

o Cisco SAN switches

o Fibre Channel zoning, path management, and fabric health monitoring

Software-Defined Access and Identity

  • Software-Defined Access (SDA)

o Cisco DNA Center appliances

o Fabric lifecycle management and policy operations

  • Identity and Access Control

o Cisco Identity Services Engine (ISE)

o TACACS servers

o Network access control, posture validation, and segmentation enforcement

Wide Area Networking and SD-WAN

  • SD-WAN Platforms

o Cisco SD-WAN controllers

o Policy-based routing, overlay and underlay monitoring

  • WAN Routing and Switching

o Cisco C8500 series routers

o Cisco C9500 series switches

o Routing, high availability, and performance management

Network Security and Traffic Control

  • Firewall and Policy Enforcement

o Firewall rule administration and secure routing

o Integration with upstream and downstream security platforms

  • Load Balancing and Traffic Management

o Enterprise load balancing platforms where applicable

o Traffic distribution, availability, and performance optimization

Network Analytics, Telemetry, and Visibility

  • Flow and Traffic Analytics

o NetFlow collectors

o NetFlow analytics consoles

o NetFlow data stores

  • Network Monitoring and Forensics

o Traffic analysis, anomaly detection, and investigation support

Operational Capabilities Across All Network Platforms

  • 24x7 operational monitoring and incident response (where contracted)
  • Configuration backup, restoration, and drift detection.
  • Patch and firmware management in accordance with approved timelines.
  • Controlled change execution with post-change validation.
  • Security posture enforcement and compliance reporting.
  • Integration with service management and reporting platforms.

Assumptions and Dependencies

  • Day-2 operational responsibility commences only after formal handover and acceptance.
  • Network designs, baselines, and architectures are provided by the implementation phase.
  • Required access, documentation, and tooling are made available at service commencement.

Service Completion Criteria

The Network Management Service is considered successfully delivered when:

  • Network services meet agreed service levels.
  • Incidents, changes, and problems are handled within defined controls.
  • Security, patching, and configuration compliance evidence is maintained.
  • Reporting and audit requirements are satisfied.

Requirements:

  • Minimum ITE/Diploma/Degree in Computer Science or relevant disciplines.
  • Minimum 4 years experience in Network Security concepts.
  • Cisco CCNA Certified or an alternative Networking Certification.
  • Strong hands-on knowledge with Networking products, e.g., routers, firewalls, switches.
  • Subject matter expert in Network configuration and planning.

For a confidential discussion, interested applicants please kindly send your updated resume.

More Info

Job Type:
Industry:
Employment Type:

Job ID: 137375945