<p>TITLE: Help Desk Support Manager /(Technical Player / Coach role) NOT JUST MANAGEMENT </p><p>LOCATION: HYBRID IN OFFICE WEEKLY BUT YOU CAN FLEX ONSITE. SOME WEEKS 100% REMOTE. </p><p>SALARY: Up to </p><p>• Remote option available, but you must reside in Iowa and be able to work onsite in the Des Moines area each week with schedule flexibility.</p><p>*** For immediate and confidential consideration, please send a message to CARRIE DANGER, SVP Permanent Placement - on LinkedIn or send an email to me with your resume. My email can be found on my LinkedIn page. ***</p><p>COMPENSATION:</p><p>• Permanent, direct-hire position with earning potential up to $125K- $130K plus a 20% bonus (based on your years of experience).</p><p>________________________________________</p><p>About the Role:</p><p>Step into a crucial “Player / Coach” technical leadership role where your blend of hands-on technical support and people management will directly shape the quality of IT services for our business. As Help Desk Support Manager, you’ll guide daily operational excellence, serve as a bridge between technical teams and business objectives, and ensure users receive exceptional support.</p><p>________________________________________</p><p>Requirements (Mashed Up):</p><p>• Proven success juggling technical troubleshooting with help desk leadership—comfortable working directly on escalated issues even as you mentor and empower a focused IT support team (3 direct reports within a 10 person department).</p><p>• Experience yourself doing hands on technical work: administering and supporting Windows servers, O365/cloud services, networks, routers/switches, and Citrix/VMware platforms, with a keen eye on performance and security from the ground up.</p><p>• Natural ability to develop and implement new workflows, maintain responsive ticketing processes, and drive continual improvements, with thoughtful IT budget and vendor oversight.</p><p>• Demonstrated strategic thinking—building and executing technical roadmaps—while staying firmly in the day-to-day support environment to address emergent needs and proactively resolve recurring pain points.</p><p>• Comfort working “in the weeds” with troubleshooting, end-user support, and infrastructure issues (storage, Active Directory, MS Exchange, VOIP systems), while being able to communicate impactfully cross-departmentally.</p><p>* JIRA Ticketing System </p><p>• Success upskilling and developing your team—identifying technical gaps and providing coaching to build out core competencies.</p><p>• BONUS if you have experience working with ERP or business application support.</p><p>• Commitment to security best practices for network, data, and end-user assets, and experience maintaining vendor relationships and supporting the company’s data center operations.</p><p>________________________________________</p><p>If you’re equally passionate about technical problem-solving and front-line leadership—and you want to make a clear, positive impact for end users and the business—let’s talk!</p><p>For immediate and confidential consideration, connect with Carrie Danger, SVP Permanent Placement, via LinkedIn or email (email address on LinkedIn profile), or call directly at 515-259-6087.</p><p>Referrals are welcome; bonuses are paid for successful placements! All communication is strictly confidential.</p>
<p>Position Summary</p><p>We are seeking an experienced Cybersecurity Operations Analyst to support security operations across a highly regulated, enterprise-scale environment. In this role, you will monitor and analyze security events, support incident response activities, and assist with maintaining compliance with internal security policies and external industry standards.</p><p>You will collaborate with cross-functional teams, security leadership, and third‑party auditors to ensure the organization maintains strong security posture and follows best practices. The ideal candidate is detail‑oriented, analytical, and able to thrive in a dynamic operational environment.</p><p><br></p><p>Key Responsibilities</p><p><br></p><p>Monitor security events using SIEM and EDR platforms.</p><p>Assist with configuration and tuning of SIEM and EDR tools.</p><p>Participate in an on‑call rotation for after-hours security support.</p><p>Conduct internal phishing simulations and analyze reported phishing incidents.</p><p>Support threat modeling efforts by assessing business impact and analyzing vulnerabilities.</p><p>Assist with internal and external audit activities as required.</p><p>Participate in the organization’s Cybersecurity Incident Response Team, using established processes to detect, respond to, and recover from security incidents.</p><p>Stay current on Cybersecurity trends and emerging technologies to provide informed recommendations.</p><p>Perform Identity & Access Management functions, including approval of RBAC and temporary access escalations.</p><p>Create and maintain internal security awareness training, including content related to incident response, phishing, and role‑based training requirements.</p><p><br></p><p><br></p><p>Required Qualifications</p><p><br></p><p>Bachelor’s degree and 2+ years of Security Operations or SOC experience</p><p>— OR 3+ years of experience as a SOC Analyst, Incident Responder, or similar role.</p><p>Understanding of core security controls (malware protection, firewalls, IDS/IPS, proxies, encryption, log management, etc.).</p><p>Strong analytical and critical thinking skills.</p><p>Excellent time management, attention to detail, and ability to adapt to changing priorities.</p><p>Ability to work in a hybrid schedule and travel occasionally within the region.</p><p><br></p><p><br></p><p>Preferred Skills</p><p><br></p><p>2+ years of hands-on experience with SIEM tools such as: QRadar, Splunk, SumoLogic, Kibana, Security Onion, ArcSight, or similar.</p><p>Experience working with EDR solutions.</p><p>Familiarity with Atlassian tools (Confluence, Jira).</p><p>Experience analyzing Threat Intelligence, identifying IOCs, and writing detection rules.</p><p>Knowledge of Palo Alto Firewalls.</p><p>Exposure to cloud environments such as AWS or GCP.</p><p>Experience with security automation platforms (e.g., XSOAR).</p><p>Scripting or programming experience (Java, Python, C, Ruby, PowerShell, Bash, etc.).</p><p>Relevant certifications (CC, SSCP, A+, Network+, Security+, GISF, GSEC, or similar).</p>