Motive
Lead Security Incident Response Engineer
Job Summary
The role involves designing and implementing security features and projects for Motive's products, with a focus on automation, security policies, and data security. The ideal candidate has expertise in programming languages such as Python or Go and experience with security testing tools and multi-cloud environments. Responsibilities include developing secure defaults, improving developer tooling, and collaborating across teams to ensure security outcomes. The position offers benefits including health insurance, paid time off, and retirement plans, and emphasizes automation, security, and cross-functional work.
Required Skills
Benefits
Job Description
Who we are:
Motive empowers the people who run physical operations with tools to make their work safer, more productive, and more profitable. For the first time ever, safety, operations and finance teams can manage their drivers, vehicles, equipment, and fleet related spend in a single system. Combined with industry leading AI, the Motive platform gives you complete visibility and control, and significantly reduces manual workloads by automating and simplifying tasks.
Motive serves more than 100,000 customers – from Fortune 500 enterprises to small businesses – across a wide range of industries, including transportation and logistics, construction, energy, field service, manufacturing, agriculture, food and beverage, retail, and the public sector.
Visit gomotive.com to learn more.
About the Role:
Motive is looking for a passionate Lead Security Incident Response Engineer to join our Security Engineering team. This team is responsible for the overall security and privacy of all products and services offered by the company. As the Lead Incident Response Engineer, you will be a foundational member, focused on designing, building, and maturing our incident detection and response program. You will be responsible for creating and implementing strategies to identify, analyze, contain, eradicate, and recover from security incidents effectively. This role requires a blend of hands-on technical expertise, strategic program development, and strong cross-functional collaboration.
In this position you will be expected to:
- Design, implement, and continuously improve our incident detection and response capabilities, including security monitoring, alert tuning, and threat hunting.
- Develop and refine incident response policies, processes, and playbooks.
- Lead technical investigations into security incidents from initial alert through to post-mortem analysis and remediation.
- Drive automation initiatives within the incident response lifecycle, leveraging scripting and SOAR platforms to enhance efficiency and reduce manual effort.
- Collaborate closely with engineering, operations, and product teams to integrate security best practices, enhance logging, and ensure swift remediation of vulnerabilities identified during incidents.
- Contribute to the continuous improvement of our security posture by identifying systemic weaknesses and advocating for preventative controls.
What you’ll do:
- Build, mature, and operate a robust incident detection and response program, encompassing people, processes, and technology.
- Develop and implement advanced detection methodologies, rules, and alerts to identify sophisticated threats rapidly.
- Lead and manage the full lifecycle of security incidents, from initial detection and triage to containment, eradication, recovery, and thorough post-incident review.
- Architect and implement security automation solutions to streamline incident response workflows, enrich alerts, and facilitate faster remediation.
- Proactively engage in threat hunting activities to uncover hidden threats and vulnerabilities across our multi-cloud environment.
- Provide expertise and guidance during critical security events, acting as a primary point of contact for technical incident management.
- Document incident findings, lessons learned, and contribute to the development of actionable intelligence to prevent future occurrences.
What we’re looking for:
- Proven ability to manage yourself, prioritize tasks, and produce high-quality results in a fast-paced environment.
- 5+ years of experience in incident response, security operations, or a closely related security discipline.
- Strong proficiency in scripting languages (e.g., Python, Go, PowerShell) for automation, data analysis, and security tooling development.
- In-depth understanding and hands-on experience with security tooling and platforms, including SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), EDR (Endpoint Detection and Response), network forensics tools, and cloud security monitoring solutions.
- Demonstrated experience building, maturing, and scaling incident response programs, including detection engineering, playbook development, and conducting incident post-mortems.
- Expert knowledge of common attack techniques (e.g., MITRE ATT&CK framework), threat intelligence methodologies, and digital forensics principles.
- Strong understanding of cloud security best practices and experience securing environments in public clouds (AWS, Azure, GCP).
- Experience with container orchestration technologies (Docker, Kubernetes) and securing microservices architectures.
- Strong communication and collaboration skills, comfortable working cross-functionally with a track record of delivering results.
- Ability to design and write program/design specifications for self and others, with a focus on comprehensive documentation.
- Self-starting and independent; able to manage and drive complex projects to completion based on defined specifications.
- Able to work across team boundaries, reach consensus amongst disparate viewpoints, and graciously receive feedback.
- Understanding of data structures and their application in security analytics and incident investigations.
As a bonus:
- Relevant industry certifications (e.g., GCIH, GCFA, GCTI, CySA+, CISSP).
- Experience in a highly regulated industry or with compliance frameworks (e.g., SOC 2, ISO 27001).
- Familiarity with serverless architectures and their security implications.
Pay Transparency
Your compensation may be based on several factors, including education, work experience, and certifications. For certain roles, total compensation may include restricted stock units. Motive offers benefits including health, pharmacy, optical and dental care benefits, paid time off, sick time off, short term and long term disability coverage, life insurance as well as 401k contribution (all benefits are subject to eligibility requirements). Learn more about our benefits by visiting Motive Perks & Benefits.
The compensation range for this position will depend on where you reside. For this role, the compensation range is:
Creating a diverse and inclusive workplace is one of Motive's core values. We are an equal opportunity employer and welcome people of different backgrounds, experiences, abilities and perspectives.
Please review our Candidate Privacy Notice here .
UK Candidate Privacy Notice here.
The applicant must be authorized to receive and access those commodities and technologies controlled under U.S. Export Administration Regulations. It is Motive's policy to require that employees be authorized to receive access to Motive products and technology.
#LI-Remote
Motive
Motive provides an integrated platform to help improve the safety, productivity, and profitability of fleet operations for the physical economy.
See more jobsSafe Remote Job Search Tips
Verify Employer Thoroughly
Research the company's identity thoroughly before applying. Check for a professional website with contacts, active social media, and LinkedIn profiles. Verify details across platforms and look for reviews on Glassdoor or Trustpilot to confirm legitimacy.
Never Pay to Get a Job
Legitimate employers never require payment for applications, training, background checks, or equipment. Always reject upfront payment requests or demands for bank details, even if they claim it's for purchasing necessary work gear on your behalf.
Safeguard Your Personal Information
Protect sensitive data like SSN, bank details, or ID copies. Share this only after accepting a formal, written job offer. Ensure it's submitted via a secure company system or portal, never through insecure channels like standard email attachments.
Scrutinize Communication & Interviews
Watch for communication red flags: poor grammar, generic emails (@gmail), vague details, or undue pressure. Be highly suspicious of interviews held only via text or chat apps; legitimate companies typically use video or phone calls.
Beware of Unrealistic Offers
If an offer's salary or benefits seem unrealistically high for the work involved, be cautious. Research standard pay for similar roles. Offers that appear 'too good to be true' are often scams designed to lure you into providing information or payment.
Insist on a Formal Contract
Always secure and review a formal, written job offer or employment contract before starting work or sharing final personal details. Ensure it clearly defines your role, compensation, key terms, and conditions to avoid misunderstandings or scams.