EmploymentOS for your Business

Security Specialist ( Remote, EU, Africa or Americas)

Macquarie Park, New South Wales 2113, Australia • Full-time

Description

Role Summary

The Security Specialist / Associate Network Engineer provides operational security and network support across multiple customer environments within a managed services model. A core requirement of the role is hands‑on analysis of security event logs and reports using FortiAnalyzer or an equivalent SIEM platform, supporting incident response, service assurance, and customer reporting.

The role is operations‑focused and works closely with NOC/SOC functions, senior engineers, and Service Delivery Management to meet SLAs and customer expectations.

Core Responsibilities

Log Analysis & Reporting (Mandatory)

  • Monitor, analyse, and interpret security and network event logs using:
    • FortiAnalyzer or
    • Another enterprise SIEM platform (e.g. Microsoft Sentinel, Splunk, QRadar, Elastic)
  • Perform daily and reactive log analysis to identify:
    • Security incidents and anomalies
    • Policy violations and blocked traffic
    • Authentication, VPN, and system‑level events
  • Use SIEM capabilities such as log filtering, correlation, dashboards, and historical search to support:
    • Incident investigation
    • Root cause analysis (RCA)
    • Trend identification
  • Produce, fine-tune, and analyse customer‑facing and internal reports, including:
    • Scheduled operational/security reports (daily, weekly, monthly)
    • Incident and post‑incident summaries
    • Audit or compliance‑support reporting where required
  • Validate log ingestion, coverage, and retention, escalating issues such as missing logs, parsing errors, or data gaps

Managed Services Operational Responsibilities

  • Provide Level 1–2 operational support for customer network and security services under defined SLAs
  • Respond to alerts and events generated by SIEM platforms in accordance with runbooks and escalation procedures
  • Execute approved BAU changes relating to security monitoring, logging, and reporting
  • Support incident, problem, and change management processes in an ITIL‑aligned environment
  • Contribute to problem management and service improvement, using log data to support findings
  • Maintain accurate customer documentation, including logging scope, alert thresholds, and report schedules
  • Participate in 24×7 operations or on‑call rotations where required

Required Technical Skills & Experience

  • 1–3 years’ experience in a network operations, security operations, SOC, NOC, or managed services role
  • Hands‑on experience with FortiAnalyzer or another SIEM platform, including:
    • Event and security log analysis
    • Log correlation and investigation
    • Report creation and scheduling
  • Ability to interpret firewall, network, and security events in a customer‑impact context
  • Solid networking fundamentals:
    • TCP/IP, routing, switching basics
    • NAT and VPN concepts (IPsec / SSL)
  • Experience working with monitoring tools, ticketing systems, and SOPs in a managed services or operations environment
  • Understanding of incident‑driven operations and escalation workflows

  • Vendor or industry certifications (desirable):
    • Fortinet (FCA / FCP or equivalent)
    • SIEM or security fundamentals
  • ITIL Foundation awareness or certification is advantageous

Personal Attributes

  • Strong analytical mindset with attention to patterns, anomalies, and trends
  • Ability to clearly explain log‑based findings to senior engineers, service delivery teams, and customers
  • Comfortable working under pressure in incident‑driven, SLA‑based environments
  • Disciplined approach to documentation, reporting accuracy, and process adherence
  • Motivation to grow into senior security, network, or SOC engineering roles

Role Type

Anywhere • Permanent • Full-time • Associate

Pay Rate

15 USD – 25 USD (Hour)