Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
At Motorola Solutions, we believe that everything starts with our people. We’re a global close-knit community, united by the relentless pursuit to help keep people safer everywhere. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, safer hospitals, safer businesses, and ultimately, safer nations. Connect with a career that matters, and help us build a safer future.
Department Overview
The Cyber Security Team protects Nødnett by enabling early detection of threats and vulnerabilities and supporting effective incident response.
The team operates a hardened, segmented on-prem security environment for monitoring, investigation and incident response support, in close cooperation with Operations/NOC, external SOC partner(s), and the network owner (DSB).
Job Description
- Perform log analysis and investigation in SIEM tooling (Splunk), including timeline building and extraction of relevant indicators.
- Perform endpoint triage and analysis using EDR tooling to validate suspected compromise and support containment decisions.
- Enrich investigations with threat intelligence and IOC context; maintain a structured record of findings and assumptions.
- Support incident response with evidence-friendly collection steps and documentation; contribute to containment, eradication and recovery activities under guidance.
- Conduct playbook-driven threat hunting (basic), and document results and follow-ups.
- Support vulnerability handling with triage, severity context (CVSS), coordination and tracking of remediation/mitigations.
- Maintain case quality: clear tickets, timely updates, and clean handovers to engineers, NOC, external SOC, or CSIRT.
- Contribute to continuous improvement: reduce recurring false positives, improve playbooks/runbooks, and propose small detection and process improvements.
Education And Experience
- Relevant technical degree or equivalent competence. Early-career profile; relevant experience from SOC/NOC/operations/helpdesk is an advantage.
- Solid understanding of networking basics (TCP/IP, DNS, HTTP, routing concepts) and how this appears in logs and investigations.
- Basic Linux and Windows administration understanding (what “normal” looks like; how to collect basic evidence and context).
- Good understanding of security controls (firewalls, proxies, VPN) and how they impact containment and investigation.
- Strong log management and log analysis ability, including structured search, correlation, and interpretation in a SIEM.
- Familiarity with endpoint telemetry and investigation workflows using EDR (alert → triage → validate → contain).
- Understanding of incident lifecycle and disciplined incident handling and escalation.
- Working knowledge of threat intelligence and IOC handling; familiarity with mapping activity to adversary techniques (e.g., MITRE ATT&CK as a common reference).
- Basic scripting for analyst workflows (e.g., parsing, enrichment, small automation tasks) and disciplined note-taking.
- Splunk for investigation and log analysis.
- Vendor case portal workflows for support and escalations.
- Ticketing/case handling and structured documentation (internal tooling).
- Exposure to EDR tooling and endpoint triage concepts.
- Curious and analytical; uses evidence and makes uncertainties explicit.
- Calm and structured under pressure; follows playbooks and escalates early when needed.
- Strong written documentation habits; concise status updates and handovers.
- Collaborative; works closely with Security Engineers, Operations/NOC and external SOC partner(s).
- Fully fluent in Norwegian and English (spoken and written).
- Norwegian security clearance at HEMMELIG (Secret) level before accession.
- Authorisation: BEGRENSET (RESTRICTED) as required.
- Clearance/authorisation must be maintained throughout employment.
- Norwegian citizenship required; background checks apply.
- Primary residence within a reasonable travel distance to Kabelgata (Oslo), as required for the role.
10-25%
Relocation Provided
None
Position Type
Experienced
Referral Payment Plan
No
Company
Motorola Solutions Norway AS
EEO Statement
Motorola Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion or belief, sex, sexual orientation, gender identity, national origin, disability, veteran status or any other legally-protected characteristic.
We are proud of our people-first and community-focused culture, empowering every Motorolan to be their most authentic self and to do their best work to deliver on the promise of a safer world. If you’d like to join our team but feel that you don’t quite meet all of the preferred skills, we’d still love to hear why you think you’d be a great addition to our team.
Key Skills
Ranked by relevanceReady to apply?
Join Motorola Solutions and take your career to the next level!
Application takes less than 5 minutes

