Find your dream job faster with JobLogr
AI-powered job search, resume help, and more.
Try for Free
Executive Operations, Inc.

Executive Operations, Inc.

via Recruitee

Apply Now
All our jobs are verified from trusted employers and sources.

SOC Analyst (Level 3) - Executive Operations

Anywhere
full-time
Posted 6/24/2025
Direct Apply
Key Skills:
Incident Response
Threat Intelligence
SIEM
EDR
IDS/IPS
Python
PowerShell
Bash
MITRE ATT&CK
Malware Analysis
NIST
ISO 27001
CISSP
CEH
GCIH
GIAC

Compensation

Salary Range

$15K - 15K a year

Responsibilities

Lead incident response, conduct threat intelligence analysis, mentor junior SOC analysts, optimize detection and response strategies, and ensure regulatory compliance.

Requirements

4–5 years cybersecurity experience with 2+ years in SOC, hands-on use of Splunk, CrowdStrike, QRadar, Tanium, scripting skills, knowledge of attack frameworks, and preferred security certifications.

Full Description

Location: Remote (Philippines-based) Schedule: Monday–Friday, 9:00 AM – 5:00 PM EST (US Based Timings) Compensation: $7/hour (approx. $1120/month) Department: Cybersecurity About the Role We are looking for an experienced SOC Analyst – Level 3 to join our security operations team supporting a U.S.-based client. As a key player, you will lead incident response, conduct threat intelligence analysis, and mentor junior SOC staff while optimizing our detection and response strategies. Key Responsibilities Lead and coordinate responses to complex cybersecurity incidents Detect and mitigate advanced threats using SIEM, EDR, IDS/IPS tools Drive threat intelligence initiatives and vulnerability identification Guide and mentor Level 1 and 2 SOC analysts Conduct root cause analysis and compile executive reports Optimize security tools and develop incident response playbooks Collaborate with cross-functional teams and ensure regulatory compliance Report incident updates to stakeholders in real time Requirements 4–5 years of cybersecurity experience, including 2+ years in a SOC environment Hands-on experience with tools like Splunk, CrowdStrike, QRadar, Tanium Strong scripting skills (Python, PowerShell, Bash) for automation Deep understanding of attack vectors, MITRE ATT&CK, malware analysis Familiar with NIST, ISO 27001, and other frameworks Excellent analytical, leadership, and communication skills Certifications such as CISSP, CEH, GCIH, GIAC are highly preferred What We Offer 100% remote opportunity Fast-paced environment working with global security experts Opportunity to drive strategy and lead security operations Collaborative team with a growth mindset

This job posting was last updated on 6/24/2025

Ready to have AI work for you in your job search?

Sign-up for free and start using JobLogr today!

Get Started »
JobLogr badge