Information Security Analyst II
Pakistan - Remote
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Motive
Motive provides an integrated platform to help improve the safety, productivity, and profitability of fleet operations for the physical economy.Who we are:
Motive empowers the people who run physical operations with tools to make their work safer, more productive, and more profitable. For the first time ever, safety, operations and finance teams can manage their drivers, vehicles, equipment, and fleet related spend in a single system. Combined with industry leading AI, the Motive platform gives you complete visibility and control, and significantly reduces manual workloads by automating and simplifying tasks.
Motive serves more than 100,000 customers – from Fortune 500 enterprises to small businesses – across a wide range of industries, including transportation and logistics, construction, energy, field service, manufacturing, agriculture, food and beverage, retail, and the public sector.
Visit gomotive.com to learn more.
About the Role:
We are seeking a highly motivated Security Operations Center (SOC) Security Analyst to join our dynamic cybersecurity team. In this role, you will be a critical part of our defense, responsible for continuous monitoring of security events, swift triage of potential incidents, and effective resolution of identified threats. The ideal candidate will possess a strong understanding of various attack vectors, security technologies, and incident response methodologies, with a passion for proactive threat detection and mitigation.
What You'll Do:
- Incident Monitoring & Detection:
- Perform continuous monitoring and analysis of security alerts and logs from various security tools (SIEM, EDR, IDS/IPS, firewalls, DLP, etc.).
- Identify, investigate, and interpret anomalous activities, security events, and potential threats across our IT environment.
- Utilize threat intelligence feeds and frameworks (e.g., MITRE ATT&CK) to contextualize and prioritize security events.
- Incident Triage & Analysis:
- Conduct in-depth analysis of security incidents to determine scope, root cause, and potential impact.
- Perform initial malware analysis, network traffic analysis, and host-based forensics to gather evidence and understand attack methodology.
- Prioritize incidents based on severity, potential impact, and organizational risk.
- Collaborate with other security teams and IT stakeholders during incident investigations.
- Incident Response & Resolution:
- Execute incident response procedures, including containment, eradication, recovery, and post-incident activities.
- Implement immediate containment measures to prevent further damage or spread of threats.
- Provide clear and concise incident reports, outlining findings, actions taken, and recommendations for improvement.
- Assist in the development and refinement of incident response playbooks and standard operating procedures (SOPs).
- Participate in on-call rotation for after-hours incident support as required.
- Security Tool Management & Optimization:
- Assist in the configuration, tuning, and optimization of security monitoring tools to reduce false positives and enhance detection capabilities.
- Provide feedback and recommendations for improving our security posture and tooling.
- Documentation & Knowledge Sharing:
- Maintain accurate and detailed documentation of security incidents, investigations, and resolutions.
- Contribute to the knowledge base, sharing insights and lessons learned with the SOC team.
- Mentor junior analysts and contribute to team training initiatives.
- Proactive Threat Hunting :
- Ability to conduct proactive threat hunting based on threat intelligence and an understanding of adversary tactics, techniques, and procedures (TTPs).
What We Are Looking For:
-
- Experience:
- 5+ years of experience in a Security Operations Center (SOC) environment, with a strong focus on incident monitoring, triage, and response.
- Demonstrated experience with various security technologies, including SIEM (e.g., Elastic, Splunk, Microsoft Sentinel, IBM QRadar), EDR (e.g., CrowdStrike, Microsoft Defender ATP, SentinelOne), IDS/IPS, firewalls, and vulnerability management tools.
- Technical Skills:
- Proficiency in analyzing security logs, network traffic, and host-based artifacts.
- Strong understanding of common attack vectors, security vulnerabilities, and exploits.
- Knowledge of cloud security principles and cloud security monitoring is highly desirable.
- Analytical & Problem-Solving Skills:
- Excellent analytical and problem-solving skills with the ability to quickly assess complex security situations.
- Strong attention to detail and ability to work effectively under pressure.
- Communication:
- Excellent written and verbal communication skills, with the ability to articulate complex technical information to both technical and non-technical audiences.
- Ability to collaborate effectively within a team environment and across departments.
- Certifications (Preferred, but not required):
- CEH or equivalent
- Security + or equivalent
- CISA (Certified Information Systems Auditor) or equivalent
- Experience:
Creating a diverse and inclusive workplace is one of Motive's core values. We are an equal opportunity employer and welcome people of different backgrounds, experiences, abilities and perspectives.
Please review our Candidate Privacy Notice here .
UK Candidate Privacy Notice here.
The applicant must be authorized to receive and access those commodities and technologies controlled under U.S. Export Administration Regulations. It is Motive's policy to require that employees be authorized to receive access to Motive products and technology.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CEH CISA Cloud CrowdStrike EDR Exploits Finance Firewalls Forensics IDS Incident response IPS Malware MITRE ATT&CK Monitoring Privacy QRadar Sentinel SIEM SOC Splunk Threat detection Threat intelligence TTPs Vulnerabilities Vulnerability management
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.