<div class="content-intro"><p><strong>Who we are:</strong></p><p>Motive empowers the people who run physical operations with tools to make their work safer, more productive, and more profitable. For the first time ever, safety, operations and finance teams can manage their drivers, vehicles, equipment, and fleet related spend in a single system. Combined with industry leading AI, the Motive platform gives you complete visibility and control, and significantly reduces manual workloads by automating and simplifying tasks.</p><p>Motive serves more than 100,000 customers – from Fortune 500 enterprises to small businesses – across a wide range of industries, including transportation and logistics, construction, energy, field service, manufacturing, agriculture, food and beverage, retail, and the public sector.</p><p>Visit <a href="http://gomotive.com">gomotive.com</a> to learn more.</p></div><h3><strong>About the Role: </strong></h3><p>Motive is looking for a passionate <strong>Lead Security Incident Response Engineer</strong> to join our Security Engineering team. This team is responsible for the overall security and privacy of all products and services offered by the company. As the Lead Incident Response Engineer, you will be a foundational member, focused on designing, building, and maturing our incident detection and response program. You will be responsible for creating and implementing strategies to identify, analyze, contain, eradicate, and recover from security incidents effectively. This role requires a blend of hands-on technical expertise, strategic program development, and strong cross-functional collaboration.</p><p><strong>In this position you will be expected to:</strong></p><ul><li>Design, implement, and continuously improve our incident detection and response capabilities, including security monitoring, alert tuning, and threat hunting.</li><li>Develop and refine incident response policies, processes, and playbooks.</li><li>Lead technical investigations into security incidents from initial alert through to post-mortem analysis and remediation.</li><li>Drive automation initiatives within the incident response lifecycle, leveraging scripting and SOAR platforms to enhance efficiency and reduce manual effort.</li><li>Collaborate closely with engineering, operations, and product teams to integrate security best practices, enhance logging, and ensure swift remediation of vulnerabilities identified during incidents.</li><li>Contribute to the continuous improvement of our security posture by identifying systemic weaknesses and advocating for preventative controls.</li></ul><p><strong>What you’ll do:</strong></p><ul><li>Build, mature, and operate a robust incident detection and response program, encompassing people, processes, and technology.</li><li>Develop and implement advanced detection methodologies, rules, and alerts to identify sophisticated threats rapidly.</li><li>Lead and manage the full lifecycle of security incidents, from initial detection and triage to containment, eradication, recovery, and thorough post-incident review.</li><li>Architect and implement security automation solutions to streamline incident response workflows, enrich alerts, and facilitate faster remediation.</li><li>Proactively engage in threat hunting activities to uncover hidden threats and vulnerabilities across our multi-cloud environment.</li><li>Provide expertise and guidance during critical security events, acting as a primary point of contact for technical incident management.</li><li>Document incident findings, lessons learned, and contribute to the development of actionable intelligence to prevent future occurrences.</li></ul><p><strong>What we’re looking for:</strong></p><ul><li>Proven ability to manage yourself, prioritize tasks, and produce high-quality results in a fast-paced environment.</li><li>5+ years of experience in incident response, security operations, or a closely related security discipline.</li><li>Strong proficiency in scripting languages (e.g., Python, Go, PowerShell) for automation, data analysis, and security tooling development.</li><li>In-depth understanding and hands-on experience with security tooling and platforms, including SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), EDR (Endpoint Detection and Response), network forensics tools, and cloud security monitoring solutions.</li><li>Demonstrated experience building, maturing, and scaling incident response programs, including detection engineering, playbook development, and conducting incident post-mortems.</li><li>Expert knowledge of common attack techniques (e.g., MITRE ATT&CK framework), threat intelligence methodologies, and digital forensics principles.</li><li>Strong understanding of cloud security best practices and experience securing environments in public clouds (AWS, Azure, GCP).</li><li>Experience with container orchestration technologies (Docker, Kubernetes) and securing microservices architectures.</li><li>Strong communication and collaboration skills, comfortable working cross-functionally with a track record of delivering results.</li><li>Ability to design and write program/design specifications for self and others, with a focus on comprehensive documentation.</li><li>Self-starting and independent; able to manage and drive complex projects to completion based on defined specifications.</li><li>Able to work across team boundaries, reach consensus amongst disparate viewpoints, and graciously receive feedback.</li><li>Understanding of data structures and their application in security analytics and incident investigations.</li></ul><p><strong>As a bonus:</strong></p><ul><li>Relevant industry certifications (e.g., GCIH, GCFA, GCTI, CySA+, CISSP).</li><li>Experience in a highly regulated industry or with compliance frameworks (e.g., SOC 2, ISO 27001).</li><li>Familiarity with serverless architectures and their security implications.</li></ul><div class="content-pay-transparency"><div class="pay-input"><div class="description"><p><em><span style="font-weight: 400;"><strong>Pay Transparency</strong><br>Your compensation may be based on several factors, including education, work experience, and certifications. For certain roles, total compensation may include restricted stock units. Motive offers benefits including health, pharmacy, optical and dental care benefits, paid time off, sick time off, short term and long term disability coverage, life insurance as well as 401k contribution (all benefits are subject to eligibility requirements). Learn more about our benefits by visiting<a href="https://www.comparably.com/companies/motive/perks-and-benefits"> Motive Perks & Benefits</a>.<br><br>The compensation range for this position will depend on where you reside. For this role, the compensation range is:</span></em></p></div><div class="title">United States</div><div class="pay-range"><span>$126,000</span><span class="divider">—</span><span>$193,000 USD</span></div></div></div><div class="content-conclusion"><p data-pm-slice="1 1 []"><em>Creating a diverse and inclusive workplace is one of Motive's core values. We are an equal opportunity employer and welcome people of different backgrounds, experiences, abilities and perspectives. </em></p><p><em>Please review our Candidate Privacy Notice <a class="ProsemirrorEditor-link" href="https://drive.google.com/file/d/1Uh_lKr15Zt3OGONfI6pgA3XfAqQHk5ww/view?usp=sharing" target="_blank">here .</a></em></p><p><em>UK Candidate Privacy Notice <a href="https://docs.google.com/document/d/1AQa2vtWiDxhlMSsKaqrGYk4z8KQaZBdr/edit?usp=sharing&ouid=116247032705400627631&rtpof=true&sd=true">here</a>.</em></p><p><em><span id="m_-8012333603671085849gmail-docs-internal-guid-8821a356-7fff-42cb-93df-e4c910033371">The applicant must be authorized to receive and access those commodities and technologies controlled under U.S. Export Administration Regulations. </span>It is Motive's policy to require that employees be authorized to receive access to Motive products and technology. </em></p><p><span style="color: #ffffff;">#LI-Remote</span></p></div>