Motive

    Information Security Analyst

    Motive
    Posted 11/14/2025Senior Level
    Full-time
    Technology
    Incident Monitoring
    Threat Detection
    Incident Response
    Security Analysis
    Malware Analysis

    ⭐ Join thousands of remote professionals with full access • From $4/week

    Job Description

    Who we are:

    Motive empowers the people who run physical operations with tools to make their work safer, more productive, and more profitable. For the first time ever, safety, operations and finance teams can manage their drivers, vehicles, equipment, and fleet related spend in a single system. Combined with industry leading AI, the Motive platform gives you complete visibility and control, and significantly reduces manual workloads by automating and simplifying tasks. Motive serves nearly 100,000 customers – from Fortune 500 enterprises to small businesses – across a wide range of industries, including transportation and logistics, construction, energy, field service, manufacturing, agriculture, food and beverage, retail, and the public sector. Visit gomotive.com to learn more.

    About the Role:

    We are seeking a highly motivated Security Operations Center (SOC) Security Analyst to join our dynamic cybersecurity team. In this role, you will be a critical part of our defense, responsible for continuous monitoring of security events, swift triage of potential incidents, and effective resolution of identified threats. The ideal candidate will possess a strong understanding of various attack vectors, security technologies, and incident response methodologies, with a passion for proactive threat detection and mitigation.

    What You'll Do:

    Incident Monitoring & Detection:

    • Perform continuous monitoring and analysis of security alerts and logs from various security tools (SIEM, EDR, IDS/IPS, firewalls, DLP, etc.).
    • Identify, investigate, and interpret anomalous activities, security events, and potential threats across our IT environment.
    • Utilize threat intelligence feeds and frameworks (e.g., MITRE ATT&CK) to contextualize and prioritize security events.

    Incident Triage & Analysis:

    • Conduct in-depth analysis of security incidents to determine scope, root cause, and potential impact.
    • Perform initial malware analysis, network traffic analysis, and host-based forensics to gather evidence and understand attack methodology.
    • Prioritize incidents based on severity, potential impact, and organizational risk.
    • Collaborate with other security teams and IT stakeholders during incident investigations.

    Incident Response & Resolution:

    • Execute incident response procedures, including containment, eradication, recovery, and post-incident activities.
    • Implement immediate containment measures to prevent further damage or spread of threats.
    • Provide clear and concise incident reports, outlining findings, actions taken, and recommendations for improvement.
    • Assist in the development and refinement of incident response playbooks and standard operating procedures (SOPs).
    • Participate in on-call rotation for after-hours incident support as required.

    Security Tool Management & Optimization:

    • Assist in the configuration, tuning, and optimization of security monitoring tools to reduce false positives and enhance detection capabilities.
    • Provide feedback and recommendations for improving our security posture and tooling.

    Documentation & Knowledge Sharing:

    • Maintain accurate and detailed documentation of security incidents, investigations, and resolutions.
    • Contribute to the knowledge base, sharing insights and lessons learned with the SOC team.
    • Mentor junior analysts and contribute to team training initiatives.

    Proactive Threat Hunting :

    • Ability to conduct proactive threat hunting based on threat intelligence and an understanding of adversary tactics, techniques, and procedures (TTPs).

    What We Are Looking For:

    Experience:

    5+ years of experience in a Security Operations Center (SOC) environment, with a strong focus on incident monitoring, triage, and response. Demonstrated experience with various security technologies, including SIEM (e.g., Elastic, Splunk, Microsoft Sentinel, IBM QRadar), EDR (e.g., CrowdStrike, Microsoft Defender ATP, SentinelOne), IDS/IPS, firewalls, and vulnerability management tools.

    Technical Skills:

    • Proficiency in analyzing security logs, network traffic, and host-based artifacts.
    • Strong understanding of common attack vectors, security vulnerabilities, and exploits.
    • Knowledge of cloud security principles and cloud security monitoring is highly desirable.

    Analytical & Problem-Solving Skills:

    • Excellent analytical and problem-solving skills with the ability to quickly assess complex security situations.
    • Strong attention to detail and ability to work effectively under pressure.

    Communication:

    • Excellent written and verbal communication skills, with the ability to articulate complex technical information to both technical and non-technical audiences.
    • Ability to collaborate effectively within a team environment and across departments.

    Certifications (Preferred, but not required):

    CEH or equivalent Security + or equivalent CISA (Certified Information Systems Auditor) or equivalent

    • Creating a diverse and inclusive workplace is one of Motive's core values. We are an equal opportunity employer and welcome people of different backgrounds, experiences, abilities and perspectives.
    • Please review our Candidate Privacy Notice here .
    • UK Candidate Privacy Notice here.

    The applicant must be authorized to receive and access those commodities and technologies controlled under U.S. Export Administration Regulations. It is Motive's policy to require that employees be authorized to receive access to Motive products and technology. #LI-Remote

    💼 Want More Jobs Like This?

    Get similar opportunities delivered to your inbox. Free, no account needed!

    Similar Jobs You Might Like

    Java Lead ENGINEER | Product R&D, Innovation & Ownership

    CSG
    Not specifiedabout 4 hours ago
    Full-time
    Java SE
    Team Leadership
    Mentorship
    Technical Decision Making
    Linux

    Senior Software Engineer (Argentina)

    Sezzle
    Not specifiedabout 5 hours ago
    Full-time
    Golang
    React
    REST APIs
    Cloud-Based Architecture
    SQL

    Senior Data Engineer

    Sezzle
    Not specifiedabout 5 hours ago
    Full-time
    Data Engineering
    AWS Redshift
    ETL
    ELT
    DBT

    Principal Software Engineer

    Sezzle
    Not specifiedabout 5 hours ago
    Full-time
    Golang
    Backend Development
    RESTful APIs
    SQL
    MySQL

    Want to see all 27,983 jobs?

    You're currently viewing 1 out of 27,983 available remote opportunities

    🔒 27,982 more jobs are waiting for you

    Unlock All Jobs

    Access every remote opportunity

    Advanced Filters

    Find your perfect match faster

    Daily Updates

    New opportunities every day

    Save & Alerts

    Never miss an opportunity

    Weekly
    $4
    Perfect for quick searches
    POPULAR
    Monthly
    $12
    Best for active job seekers
    Yearly
    $48
    Save 67% • Best value
    Unlock All 27983 Jobs

    Join thousands of remote workers who found their dream job

    Frequently Asked Questions

    What's included in premium access?

    Premium members get unlimited access to all remote job listings, advanced search filters, job alerts, and the ability to save favorite jobs.

    Can I cancel anytime?

    Yes! You can cancel your subscription at any time from your account settings. You'll continue to have access until the end of your billing period.

    Do you offer refunds?

    We offer a 7-day money-back guarantee on all plans. If you're not satisfied, contact us within 7 days for a full refund.

    Is my payment secure?

    Absolutely! We use Stripe for payment processing, which is trusted by millions of businesses worldwide. We never store your payment information.