Executive Operations is hiring multiple Security Operations Center (SOC) Analysts to join our growing cybersecurity team supporting a U.S.-based client. We’re hiring across Levels 1 to 3, so if you have hands-on experience in threat detection, incident response, or cybersecurity monitoring — we want to hear from you!
This is a remote, PH-based position operating on U.S. business hours.
Schedule: Monday–Friday, 9:00 AM – 5:00 PM EST
Location: Fully Remote (Philippines-based)
Start Date: Targeting April 21, 2025
Level 1: $4/hour (640$/month)
Level 2: $5/hour (800$/month)
Level 3: $6/hour (960/month)
Final level placement will be determined after interview and technical evaluation.
Monitor and analyze security alerts from SIEM and EDR tools
Triage and escalate incidents based on severity
Document and update incident response procedures
Investigate indicators of compromise (IOCs)
Collaborate with senior SOC staff for root cause analysis
Proactively hunt for threats and vulnerabilities in client environments (Level 3)
Experience with security monitoring tools (e.g., CrowdStrike, SentinelOne, Arctic Wolf)
Familiarity with MITRE ATT&CK, SIEM platforms, IDS/IPS, and log analysis
Strong understanding of incident response, network security, and threat intel
Excellent written and verbal communication skills
Willingness to work EST hours
CompTIA Security+
EC-Council CEH
Cisco CyberOps
GCIH / GCIA / GCFA
Please upload your updated CV, note your available start date, and indicate if you’ve used CrowdStrike or Arctic Wolf tools in the past.
Your application has been successfully submitted!