Security Specialist
Location
United States + 127 moreAll locations: United States, Canada, Brazil, Colombia, Argentina, Chile, Venezuela, Bolivarian Republic Of, Bolivia, Plurinational State Of, Ecuador, French Guiana, Guyana, Paraguay, Peru, Suriname, Uruguay, Mexico, Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua, Panama, Dominican Republic, Puerto Rico, Bahamas, Guadeloupe, Haiti, Jamaica, Martinique, Montserrat, United Kingdom, Germany, France, Estonia, Portugal, Hungary, Poland, Ukraine, Romania, Bulgaria, Czech Republic, Slovakia, Belarus, Moldova, Republic Of, Sweden, Greece, Belgium, Italy, Ireland, Switzerland, Netherlands, Finland, Malta, Denmark, Lithuania, Croatia, Spain, Austria, Bosnia And Herzegovina, Iceland, Luxembourg, Macedonia, The Former Yugoslav Republic Of, Montenegro, Norway, Serbia, Slovenia, Albania, Cyprus, Latvia, Monaco, South Africa, Egypt, Algeria, Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cape Verde, Central African Republic, Chad, Congo, Côte D'ivoire, Congo, The Democratic Republic Of The, Equatorial Guinea, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-bissau, Kenya, Lesotho, Liberia, Libyan Arab Jamahiriya, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mayotte, Morocco, Mozambique, Namibia, Niger, Nigeria, Réunion, Rwanda, Senegal, Seychelles, Sierra Leone, Somalia, Sudan, Swaziland, Tanzania, United Republic Of, Togo, Tunisia, Uganda, Zambia, Zimbabwe
Posted
2 days ago
Salary
$25 / year
No structured requirement data.
Job Description
Role Description
The Security Specialist / Associate Network Engineer provides operational security and network support across multiple customer environments within a managed services model. A core requirement of the role is hands-on analysis of security event logs and reports using FortiAnalyzer or an equivalent SIEM platform, supporting incident response, service assurance, and customer reporting. The role is operations-focused and works closely with NOC/SOC functions, senior engineers, and Service Delivery Management to meet SLAs and customer expectations.
Core Responsibilities
- Log Analysis & Reporting (Mandatory)
- Monitor, analyse, and interpret security and network event logs using:
- FortiAnalyzer
- Another enterprise SIEM platform (e.g. Microsoft Sentinel, Splunk, QRadar, Elastic)
- Perform daily and reactive log analysis to identify:
- Security incidents and anomalies
- Policy violations and blocked traffic
- Authentication, VPN, and system-level events
- Use SIEM capabilities such as log filtering, correlation, dashboards, and historical search to support:
- Incident investigation
- Root cause analysis (RCA)
- Trend identification
- Produce, fine-tune, and analyse customer-facing and internal reports, including:
- Scheduled operational/security reports (daily, weekly, monthly)
- Incident and post-incident summaries
- Audit or compliance-support reporting where required
- Validate log ingestion, coverage, and retention, escalating issues such as missing logs, parsing errors, or data gaps.
- Managed Services Operational Responsibilities
- Provide Level 1–2 operational support for customer network and security services under defined SLAs.
- Respond to alerts and events generated by SIEM platforms in accordance with runbooks and escalation procedures.
- Execute approved BAU changes relating to security monitoring, logging, and reporting.
- Support incident, problem, and change management processes in an ITIL-aligned environment.
- Contribute to problem management and service improvement, using log data to support findings.
- Maintain accurate customer documentation, including logging scope, alert thresholds, and report schedules.
- Participate in 24×7 operations or on-call rotations where required.
Qualifications
- 1–3 years’ experience in a network operations, security operations, SOC, NOC, or managed services role.
- Hands-on experience with FortiAnalyzer or another SIEM platform, including:
- Event and security log analysis
- Log correlation and investigation
- Report creation and scheduling
- Ability to interpret firewall, network, and security events in a customer-impact context.
- Solid networking fundamentals: TCP/IP, routing, switching basics, NAT and VPN concepts (IPsec / SSL).
- Experience working with monitoring tools, ticketing systems, and SOPs in a managed services or operations environment.
- Understanding of incident-driven operations and escalation workflows.
- Vendor or industry certifications (desirable): Fortinet (FCA / FCP or equivalent), SIEM or security fundamentals.
- ITIL Foundation awareness or certification is advantageous.
Personal Attributes
- Strong analytical mindset with attention to patterns, anomalies, and trends.
- Ability to clearly explain log-based findings to senior engineers, service delivery teams, and customers.
- Comfortable working under pressure in incident-driven, SLA-based environments.
- Disciplined approach to documentation, reporting accuracy, and process adherence.
- Motivation to grow into senior security, network, or SOC engineering roles.
Job Requirements
- 1–3 years’ experience in a network operations, security operations, SOC, NOC, or managed services role.
- Hands-on experience with FortiAnalyzer or another SIEM platform, including:
- Event and security log analysis
- Log correlation and investigation
- Report creation and scheduling
- Ability to interpret firewall, network, and security events in a customer-impact context.
- Solid networking fundamentals: TCP/IP, routing, switching basics, NAT and VPN concepts (IPsec / SSL).
- Experience working with monitoring tools, ticketing systems, and SOPs in a managed services or operations environment.
- Understanding of incident-driven operations and escalation workflows.
- Vendor or industry certifications (desirable): Fortinet (FCA / FCP or equivalent), SIEM or security fundamentals.
- ITIL Foundation awareness or certification is advantageous.
- Personal Attributes
- Strong analytical mindset with attention to patterns, anomalies, and trends.
- Ability to clearly explain log-based findings to senior engineers, service delivery teams, and customers.
- Comfortable working under pressure in incident-driven, SLA-based environments.
- Disciplined approach to documentation, reporting accuracy, and process adherence.
- Motivation to grow into senior security, network, or SOC engineering roles.
Related Guides
Related Categories
Related Job Pages
More Security Analyst Jobs
***This positions is contingent on contract award***RMC is hiring for an Occupational Safety and Health (OSH) professional to support the safety and health management needs of a large federal agency.  This position c...
***This positions is contingent on contract award***RMC is hiring for an Occupational Safety and Health (OSH) professional to support the safety and health management needs of a large federal agency.  This position c...
The Fire Investigator is tasked with conducting timely field visits to loss sites to perform cause and origin investigations for fires and explosions, providing honest and unbiased analysis. They must write and submit detailed, accurate reports on completed investigations and be prepared to provide expert testimony or depositions when necessary.
The Fire Investigator is tasked with studying fire and explosion scenes to determine the cause and origin, conducting timely field visits, and performing necessary research and analysis. Responsibilities also include clearly conveying findings through detailed written reports and providing expert testimony or depositions when required.