xelys jobs xelys jobs

Security IT Support Engineer

Crypto.com

midpermanentsecuritybackend United States 2 days ago via LinkedIn

See how well this job matches your profile

Sign up to get an AI match score and generate a tailored application in seconds.

Get your match score

Tags

IT SupportSecurity OperationsEndpoint ManagementMDMIdentity and Access ManagementVulnerability ManagementPatch ManagementVulnerability ScanningLeast PrivilegeAI Security

About the role

Role Overview

Security IT Support Engineer at Crypto.com, supporting a security-first environment. You’ll own day-to-day IT support for endpoints and access, while also driving vulnerability management and helping teams adopt AI tools safely.

Responsibilities

  • IT Support (First Line): Resolve issues, meet SLAs, and keep operations moving.
  • Endpoint Management: Manage the full device lifecycle (laptops, desktops, mobiles, VDI) including deployment, configuration, and troubleshooting.
  • Patch Management: Maintain updates for endpoints, workstations, cloud servers, and VDI; track patch needs and report status.
  • Vulnerability Management: Run vulnerability scans, interpret results, prioritize by risk, and drive remediation to closure.
  • Access & Identity: Administer user accounts and access rights; enforce least privilege; handle provisioning and deprovisioning securely.
  • Threat Prevention: Support and monitor security controls such as endpoint protection, DLP, email security, and network controls.
  • Asset Management: Maintain accurate inventory (what you have, where it is, and who owns it).
  • Onboarding & Offboarding: Properly set up new users and revoke access cleanly when users leave.
  • AI Enablement & Security: Help teams use AI tools safely; identify risks like prompt injection, data leakage, and insecure integrations; ensure appropriate guardrails.

Requirements

  • 3+ years in an IT support or IT operations role.
  • Strong experience with Identity & Access Management (IAM), MDM, and endpoint security tools.
  • Some exposure to patch management (laptops is acceptable) and willingness to expand scope.
  • Prior exposure to vulnerability scanning and a basic understanding of interpreting results.
  • Understanding of how workplace AI tools are used and awareness of security risks.
  • Ability to translate technical concepts for non-technical stakeholders.
  • Highly self-directed and proactive, maintaining momentum without heavy external guidance.

Nice-to-haves

  • Deeper experience across broader vulnerability management and enterprise security controls.

About Crypto.com

Crypto.com is a technology and crypto platform company focused on user security. Its Security team covers Security, Privacy, and Security Compliance, led by experienced cybersecurity professionals and guided by recognized leadership and industry standards.

Scraped 4/22/2026

xelys jobs xelys jobs

Built for remote job seekers. Powered by AI.