FlexHired LogoFlexHired
Logo of Motive

Motive

Information Security Analyst II

Job Summary

The role involves monitoring security alerts, analyzing security incidents, and responding to threats using various security tools and techniques. Candidates should have extensive experience in a SOC environment, with proficiency in tools like SIEM, EDR, IDS/IPS, and firewalls. The position requires strong analytical skills, attention to detail, and effective communication abilities. Additionally, proactive threat hunting and knowledge of security frameworks are highly valued.

Required Skills

Security Frameworks
Threat Intelligence
Incident Response
Security Technologies
Threat Hunting
Log Analysis
Threat Detection
Network Traffic Analysis
Incident Monitoring
Security Tool Management
Host-Based Forensics

Job Description

Who we are:

Motive empowers the people who run physical operations with tools to make their work safer, more productive, and more profitable. For the first time ever, safety, operations and finance teams can manage their drivers, vehicles, equipment, and fleet related spend in a single system. Combined with industry leading AI, the Motive platform gives you complete visibility and control, and significantly reduces manual workloads by automating and simplifying tasks.

Motive serves more than 100,000 customers – from Fortune 500 enterprises to small businesses – across a wide range of industries, including transportation and logistics, construction, energy, field service, manufacturing, agriculture, food and beverage, retail, and the public sector.

Visit gomotive.com to learn more.

About the Role:

We are seeking a highly motivated Security Operations Center (SOC) Security Analyst to join our dynamic cybersecurity team. In this role, you will be a critical part of our defense, responsible for continuous monitoring of security events, swift triage of potential incidents, and effective resolution of identified threats. The ideal candidate will possess a strong understanding of various attack vectors, security technologies, and incident response methodologies, with a passion for proactive threat detection and mitigation.

What You'll Do:

  • Incident Monitoring & Detection:
    • Perform continuous monitoring and analysis of security alerts and logs from various security tools (SIEM, EDR, IDS/IPS, firewalls, DLP, etc.).
    • Identify, investigate, and interpret anomalous activities, security events, and potential threats across our IT environment.
    • Utilize threat intelligence feeds and frameworks (e.g., MITRE ATT&CK) to contextualize and prioritize security events.
  • Incident Triage & Analysis:
    • Conduct in-depth analysis of security incidents to determine scope, root cause, and potential impact.
    • Perform initial malware analysis, network traffic analysis, and host-based forensics to gather evidence and understand attack methodology.
    • Prioritize incidents based on severity, potential impact, and organizational risk.
    • Collaborate with other security teams and IT stakeholders during incident investigations.
  • Incident Response & Resolution:
    • Execute incident response procedures, including containment, eradication, recovery, and post-incident activities.
    • Implement immediate containment measures to prevent further damage or spread of threats.
    • Provide clear and concise incident reports, outlining findings, actions taken, and recommendations for improvement.
    • Assist in the development and refinement of incident response playbooks and standard operating procedures (SOPs).
    • Participate in on-call rotation for after-hours incident support as required.
  • Security Tool Management & Optimization:
    • Assist in the configuration, tuning, and optimization of security monitoring tools to reduce false positives and enhance detection capabilities.
    • Provide feedback and recommendations for improving our security posture and tooling.
  • Documentation & Knowledge Sharing:
    • Maintain accurate and detailed documentation of security incidents, investigations, and resolutions.
    • Contribute to the knowledge base, sharing insights and lessons learned with the SOC team.
    • Mentor junior analysts and contribute to team training initiatives.
  • Proactive Threat Hunting :
    • Ability to conduct proactive threat hunting based on threat intelligence and an understanding of adversary tactics, techniques, and procedures (TTPs).

What We Are Looking For:

    • Experience:
      • 5+ years of experience in a Security Operations Center (SOC) environment, with a strong focus on incident monitoring, triage, and response.
      • Demonstrated experience with various security technologies, including SIEM (e.g., Elastic, Splunk, Microsoft Sentinel, IBM QRadar), EDR (e.g., CrowdStrike, Microsoft Defender ATP, SentinelOne), IDS/IPS, firewalls, and vulnerability management tools.
    • Technical Skills:
      • Proficiency in analyzing security logs, network traffic, and host-based artifacts.
      • Strong understanding of common attack vectors, security vulnerabilities, and exploits.
      • Knowledge of cloud security principles and cloud security monitoring is highly desirable.
    • Analytical & Problem-Solving Skills:
      • Excellent analytical and problem-solving skills with the ability to quickly assess complex security situations.
      • Strong attention to detail and ability to work effectively under pressure.
    • Communication:
      • Excellent written and verbal communication skills, with the ability to articulate complex technical information to both technical and non-technical audiences.
      • Ability to collaborate effectively within a team environment and across departments.
    • Certifications (Preferred, but not required):
      • CEH or equivalent
      • Security + or equivalent
      • CISA (Certified Information Systems Auditor) or equivalent



Creating a diverse and inclusive workplace is one of Motive's core values. We are an equal opportunity employer and welcome people of different backgrounds, experiences, abilities and perspectives.

Please review our Candidate Privacy Notice here .

UK Candidate Privacy Notice here.

The applicant must be authorized to receive and access those commodities and technologies controlled under U.S. Export Administration Regulations. It is Motive's policy to require that employees be authorized to receive access to Motive products and technology.

#LI-Remote

Interested in this job?

Application deadline: Open until filled

Logo of Motive

Motive

Motive provides an integrated platform to help improve the safety, productivity, and profitability of fleet operations for the physical economy.

See more jobs
Date PostedJuly 15th, 2025
Job TypeFull Time
LocationPakistan - Remote
SalaryCompetitive rates
Exciting remote opportunity (requires residency in Pakistan) for a Information Security Analyst II at Motive. Offering competitive salary (full time). Explore more remote jobs on FlexHired!

Safe Remote Job Search Tips

Verify Employer Thoroughly

Research the company's identity thoroughly before applying. Check for a professional website with contacts, active social media, and LinkedIn profiles. Verify details across platforms and look for reviews on Glassdoor or Trustpilot to confirm legitimacy.

Never Pay to Get a Job

Legitimate employers never require payment for applications, training, background checks, or equipment. Always reject upfront payment requests or demands for bank details, even if they claim it's for purchasing necessary work gear on your behalf.

Safeguard Your Personal Information

Protect sensitive data like SSN, bank details, or ID copies. Share this only after accepting a formal, written job offer. Ensure it's submitted via a secure company system or portal, never through insecure channels like standard email attachments.

Scrutinize Communication & Interviews

Watch for communication red flags: poor grammar, generic emails (@gmail), vague details, or undue pressure. Be highly suspicious of interviews held only via text or chat apps; legitimate companies typically use video or phone calls.

Beware of Unrealistic Offers

If an offer's salary or benefits seem unrealistically high for the work involved, be cautious. Research standard pay for similar roles. Offers that appear 'too good to be true' are often scams designed to lure you into providing information or payment.

Insist on a Formal Contract

Always secure and review a formal, written job offer or employment contract before starting work or sharing final personal details. Ensure it clearly defines your role, compensation, key terms, and conditions to avoid misunderstandings or scams.

Related Jobs

Full Time
Pakistan - Remote
Full Time
Pakistan - Remote
Full Time
Pakistan - Remote
Full Time
Pakistan - Remote
Full Time
Pakistan - Remote

Subscribe Newsletter

Never miss a remote job opportunity. Subscribe to our newsletter today and receive exclusive job alerts, career advice, and industry insights delivered straight to your inbox.