At Motorola Solutions, we believe that everything starts with our people. We’re a global close-knit community, united by the relentless pursuit to help keep people safer everywhere. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, safer hospitals, safer businesses, and ultimately, safer nations. Connect with a career that matters, and help us build a safer future.
Own engineering and day-to-day operations of the security enclave platform for monitoring, investigation and incident response support.
Design and operate security zones, trust boundaries and controlled flows (incl. DMZ patterns).
Operate and harden enclave infrastructure and core services (virtualization, Linux, containers, identity/time/name services).
Maintain monitoring/alerting for availability, capacity and security-relevant signals.
Maintain backup/recovery with tested restores and documented procedures.
Own vulnerability handling in operations: prioritisation, patch/mitigation, verification, and documentation of risk decisions and status.
Ensure telemetry quality and investigation readiness: onboarding/validation, time synchronisation, normalization where feasible, and identification of coverage gaps.
Support incidents with safe engineering actions (e.g., containment-support changes, enabling additional telemetry, evidence-friendly data collection) with clear documentation.
Build and maintain runbooks/playbooks and automation; convert lessons learned into continuous improvements.
Provide status reporting and maintain accurate documentation for traceability and operational use during incidents.
Education and experience:
Relevant technical degree with minimum 3 years relevant experience, or minimum 5 years relevant experience with good references.
Core engineering foundation (expected competence):
Network operations fundamentals including routing/switching, filtering, firewall policy work and strict segmentation.
Linux administration and troubleshooting in production (Ubuntu/Debian; Windows familiarity where needed for integration/monitoring).
Practical storage and failure-mode understanding; capacity and reliability considerations.
TLS/certificates and certificate lifecycle handling for service identity and secure communication.
Identity and access management principles and lifecycle in segmented environments.
Virtualization and container operations, including container networking concepts used for isolation/segmentation (e.g., macvlan patterns).
Scripting and version control for repeatable operations (Bash/Python; Git-based workflows).
Operational monitoring (health/performance/availability) and log/telemetry interpretation.
Backup and recovery design and operations, including tested restores and offline/segmented constraints where relevant.
DevOps-style practices: versioned configuration, infrastructure-as-code, controlled automation and lifecycle management.
Security engineering competence (expected competence):
Secure architecture with zones, trust boundaries and least-privilege flows.
Hardening and secure configuration baselines; verification and drift awareness.
Vulnerability management under time pressure (patch/mitigate/contain; verify; document decisions).
Reliability engineering for fault tolerance and graceful degradation.
Telemetry onboarding and maintenance; visibility gap identification and improvement.
Detection/detection-support engineering using available telemetry and threat-informed methods (as applicable to platform role).
Response readiness: operate tooling and workflows that support safe containment and investigation.
Security monitoring and incident response support with evidence-friendly handling and disciplined documentation.
Risk identification, treatment proposals, and traceable documentation of decisions.
Tools/technology (expected practical experience):
Segmentation and firewall/switching operations (Cisco/FortiGate or equivalent).
Virtualization platform operations (HPE VM Essentials or equivalent).
Elastic Stack (or equivalent) for telemetry/search/investigation readiness; Kafka or similar components is relevant.
GitLab (or equivalent) for docs/tickets/version control/automation workflows.
Docker in production operations and troubleshooting.
Soft-skills:
Structured and rigorous; disciplined documentation and change practices.
Calm under pressure; able to execute safe changes during incidents.
Strong prioritisation (planned platform work vs urgent incident-driven needs).
Collaborative and communicative across engineering, operations and external partners.
High integrity and discretion in sensitive environments.
Language Skills:
Fully fluent in Norwegian and English (spoken and written).
Security clearance and authorisation:
Norwegian security clearance at HEMMELIG (Secret) level before accession.
Authorisation: BEGRENSET (RESTRICTED) as required.
Clearance/authorisation must be maintained throughout employment.
Norwegian citizenship required; background checks apply.
Primary residence within reasonable travel distance to Kabelgata (Oslo), as required for the role.
EEO Statement
Motorola Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion or belief, sex, sexual orientation, gender identity, national origin, disability, veteran status or any other legally-protected characteristic.
We are proud of our people-first and community-focused culture, empowering every Motorolan to be their most authentic self and to do their best work to deliver on the promise of a safer world. If you’d like to join our team but feel that you don’t quite meet all of the preferred skills, we’d still love to hear why you think you’d be a great addition to our team.