Remote Otter LogoRemoteOtter

Information Security Analyst II - Remote

Posted 22 hours ago
DevOps / Sysadmin
Full Time
Pakistan

Overview

Motive empowers the people who run physical operations with tools to make their work safer, more productive, and more profitable. For the first time ever, safety, operations and finance teams can manage their drivers, vehicles, equipment, and fleet related spend in a single system. Combined with industry leading AI, the Motive platform gives you complete visibility and control, and significantly reduces manual workloads by automating and simplifying tasks.

Motive serves more than 100,000 customers – from Fortune 500 enterprises to small businesses – across a wide range of industries, including transportation and logistics, construction, energy, field service, manufacturing, agriculture, food and beverage, retail, and the public sector.

Visit gomotive.com to learn more.

About the Role:

We are seeking a highly motivated Security Operations Center (SOC) Security Analyst to join our dynamic cybersecurity team. In this role, you will be a critical part of our defense, responsible for continuous monitoring of security events, swift triage of potential incidents, and effective resolution of identified threats. The ideal candidate will possess a strong understanding of various attack vectors, security technologies, and incident response methodologies, with a passion for proactive threat detection and mitigation.

What You'll Do:

  • Incident Monitoring & Detection:
    • Perform continuous monitoring and analysis of security alerts and logs from various security tools (SIEM, EDR, IDS/IPS, firewalls, DLP, etc.).
    • Identify, investigate, and interpret anomalous activities, security events, and potential threats across our IT environment.
    • Utilize threat intelligence feeds and frameworks (e.g., MITRE ATT&CK) to contextualize and prioritize security events.
  • Incident Triage & Analysis:
    • Conduct in-depth analysis of security incidents to determine scope, root cause, and potential impact.
    • Perform initial malware analysis, network traffic analysis, and host-based forensics to gather evidence and understand attack methodology.
    • Prioritize incidents based on severity, potential impact, and organizational risk.
    • Collaborate with other security teams and IT stakeholders during incident investigations.
  • Incident Response & Resolution:
    • Execute incident response procedures, including containment, eradication, recovery, and post-incident activities.
    • Implement immediate containment measures to prevent further damage or spread of threats.
    • Provide clear and concise incident reports, outlining findings, actions taken, and recommendations for improvement.
    • Assist in the development and refinement of incident response playbooks and standard operating procedures (SOPs).
    • Participate in on-call rotation for after-hours incident support as required.
  • Security Tool Management & Optimization:
    • Assist in the configuration, tuning, and optimization of security monitoring tools to reduce false positives and enhance detection capabilities.
    • Provide feedback and recommendations for improving our security posture and tooling.
  • Documentation & Knowledge Sharing:
    • Maintain accurate and detailed documentation of security incidents, investigations, and resolutions.
    • Contribute to the knowledge base, sharing insights and lessons learned with the SOC team.
    • Mentor junior analysts and contribute to team training initiatives.
  • Proactive Threat Hunting:
    • Ability to conduct proactive threat hunting based on threat intelligence and an understanding of adversary tactics, techniques, and procedures (TTPs).

What We Are Looking For:

    • Experience:
      • 5+ years of experience in a Security Operations Center (SOC) environment, with a strong focus on incident monitoring, triage, and response.
      • Demonstrated experience with various security technologies, including SIEM (e.g., Elastic, Splunk, Microsoft Sentinel, IBM QRadar), EDR (e.g., CrowdStrike, Microsoft Defender ATP, SentinelOne), IDS/IPS, firewalls, and vulnerability management tools.
    • Technical Skills:
      • Proficiency in analyzing security logs, network traffic, and host-based artifacts.
      • Strong understanding of common attack vectors, security vulnerabilities, and exploits.
      • Knowledge of cloud security principles and cloud security monitoring is highly desirable.
    • Analytical & Problem-Solving Skills:
      • Excellent analytical and problem-solving skills with the ability to quickly assess complex security situations.
      • Strong attention to detail and ability to work effectively under pressure.
    • Communication:
      • Excellent written and verbal communication skills, with the ability to articulate complex technical information to both technical and non-technical audiences.
      • Ability to collaborate effectively within a team environment and across departments.
    • Certifications (Preferred, but not required):
      • CEH or equivalent
      • Security + or equivalent
      • CISA (Certified Information Systems Auditor) or equivalent



Creating a diverse and inclusive workplace is one of Motive's core values. We are an equal opportunity employer and welcome people of different backgrounds, experiences, abilities and perspectives. 

Please review our Candidate Privacy Notice here .

UK Candidate Privacy Notice here.

The applicant must be authorized to receive and access those commodities and technologies controlled under U.S. Export Administration Regulations. It is Motive's policy to require that employees be authorized to receive access to Motive products and technology. 

#LI-Remote

Motive logo

Motive

Motive is a dynamic and rapidly growing company specializing in SaaS solutions for businesses operating trucks across the United States. With a focus on driving new business sales, Motive empowers its team members to take ownership of the sales cycle, from prospecting to closing deals. The company values driven and experienced sales professionals who are committed to achieving results and offers opportunities for advancement within its Premier and Enterprise sales segments. Motive promotes a collaborative work environment, allowing employees to work remotely while engaging in on-site customer meetings. The company is dedicated to fostering a culture of continuous learning and innovation, encouraging its team to embody a growth mindset and proactively seek creative solutions.

Share This Job!

Save This Job!

Similar Jobs:

Motive logo

Information Security Analyst II - Remote

Motive

17 weeks ago

Join Motive as an Information Security Analyst II to protect and manage the organization's information assets.

Worldwide
Full-time
All others
Proficio logo

Information Security Analyst II - Remote

Proficio

24 weeks ago

The Information Security Analyst II is responsible for managing security alerts and improving threat detection capabilities.

Worldwide
Full-time
Software Development
Proficio logo

Information Security Analyst II - Remote

Proficio

24 weeks ago

The Information Security Analyst II is responsible for managing security alerts and improving threat detection capabilities.

Worldwide
Full-time
Software Development
thehivecareers.co logo

Information Security Analyst - Remote

thehivecareers.co

4 weeks ago

The Information Security Analyst is tasked with safeguarding digital assets and ensuring data security against cyber threats.

Barbados
Full-time
Software Development
Delinea logo

Information Security Analyst - Remote

Delinea

5 weeks ago

Join Delinea as an Information Security Analyst to enhance security monitoring and respond to incidents.

Mexico
Full-time
DevOps / Sysadmin