Cybersecurity Operations Analyst


Since 1992, Kingland’s managed solutions have helped data-intensive, highly-regulated clients connect and protect their businesses. Kingland develops and manages enterprise-class software solutions using its Kingland Platform and teams of data and technology experts. Clients in the banking and capital markets, public accounting, insurance, and retail industries look to Kingland to create solutions to manage data, risk, compliance, customer insight and more. The Kingland Platform is a highly secure, cloud-optimized software platform that includes enterprise data management, text analytics, artificial intelligence and machine learning, and workflow and compliance management capabilities.

Kingland is unique. While we are based in Iowa, our clients are not. We are an Iowa company with a significant global reach. We provide our employees with the opportunity to “live locally and work globally”, combining the Iowa quality of life that we all love, with exciting opportunities to travel the world and work on large projects for large clients.

Kingland is growing. We’re looking for individuals who like to tackle big challenges, want to work on mission-critical solutions, as well as desire to make a difference in the world — and be rewarded for their efforts. Explore all the ways that quality of work meets quality of life at Kingland, and launch yourself on an exciting new adventure.

POSITION SUMMARY | Cybersecurity Operations Analyst

The Security Analyst is responsible for the success of security operations activities managed by the Kingland Security Office. The Security Operations Analyst may work with stakeholders from a variety of teams to help ensure that each department of Kingland adheres to corporate security policies and standards. The Security Operations Analyst will primarily monitor our SIEM and EDR solutions and provide operational support for Kingland Corporation, clients, and our software products.

RESPONSIBILITIES AND DUTIES | Cybersecurity Operations Analyst

  • Creating and maintaining corporate security training modules related to Incident response, phishing, role based training, and general security awareness trainings.
  • Reviewing and approving both RBAC and temporary access role escalations as well as additional Identity and Access Management processes)
  • Monitoring security events using SIEM and EDR tools.
  • Ability to work an “on-call” rotation for afterhours support.
  • Investigating and advising on business impact from threat modeling of vulnerabilities.
  • Conduct internal phishing campaigns.
  • Participating in internal and third-party audits as needed.
  • Participate in the Cybersecurity Incident Response Team to employ strategy, standards, processes, and technology to detect, respond, and recover from security incidents and limit occurrence or reoccurrence by using risk-based triage.
  • Stay abreast of Cyber Security best practices and emerging technologies to provide security recommendations tailored to specific requirements and needs

POSITION REQUIREMENTS | Cybersecurity Operations Analyst

  • Bachelor’s degree and 1+ years of SOC or Security Operations Experience or 3+ years requisite experience as a SOC Analyst, IR team responder, or similar role.
  • Knowledge and understanding of data security controls including malware protection, firewalls, intrusion detection systems, content filtering, Internet proxies, encryption controls, and log management solutions.
  • Strong work and time management skills and attention to details.
  • Strong analytical skills and the ability to think critically.
  • Ability to adapt quickly to changes in priorities.
  • Ability to travel to Clear Lake and Ames, Iowa office locations.
  • The ideal candidate works hybrid from the Ames office 2-3 days per week.

DESIRED SKILLSETS | Cybersecurity Operations Analyst

  • 2+ years of experience with SIEM solutions such as QRadar, Splunk, SumoLogic Cloud SIEM, Kibana, Security Onion, ArcSight or similar.
  • Experience with Atlassian Products (Confluence & Jira).
  • Experience gathering, reading, and acting upon Threat Intelligence.
  • Experience identifying IOC’s and writing detection rules.
  • Familiarity with Palo Alto Firewalls.
  • Familiarity with AWS, GCP, and cloud monitoring solutions.
  • Experience working with EDR solutions.
  • Automation experience.
  • Familiarity with one or more of the following programming or scripting languages. Java, Python, C, Ruby, PowerShell, Bash or similar.
  • Certifications in one or more of the following are preferred: (OSWP), (OSCE), (OSEE), Security+, CySA+, (CEH), GSEC, (OSWE), or similar intermediate level certificates.
  • Certifications in one or more of the following are desired but not preferred: (CISSP), (OSCP), (CASP+) or similar.


Kingland has an awesome suite of benefits that sets us apart from others. We are authentic in our commitment to providing team members an exceptional experience where they feel supported and valued by the Company, in an environment where they are set up for success. We recognize that each individual has unique needs, and our health and welfare, wellness, lifestyle and total rewards benefits are designed for that reason. Visit for a listing of the great benefits and perks we have to offer for this position!


Kingland offers modern office locations in our Ames or Clear Lake, Iowa facilities

To apply for this job email your details to

Interest Form

Join A TAI Roundtable

Please fill out this form to indicate your interest in joining one of Technology Association of Iowa’s Roundtables.

Participation in the CIO, CISO or CEO Roundtables is exclusively reserved for technology executives of TAI member organizations with these (or comparable) job titles. All other TAI Roundtables is exclusively reserved for individuals employed by TAI member organizations. Not a member? Join now.

  • This field is for validation purposes and should be left unchanged.