Security IT Support Engineer
Crypto.com
midpermanentsecuritybackend United States 2 days ago via LinkedIn
See how well this job matches your profile
Sign up to get an AI match score and generate a tailored application in seconds.
Get your match scoreTags
IT SupportSecurity OperationsEndpoint ManagementMDMIdentity and Access ManagementVulnerability ManagementPatch ManagementVulnerability ScanningLeast PrivilegeAI Security
About the role
Role Overview
Security IT Support Engineer at Crypto.com, supporting a security-first environment. You’ll own day-to-day IT support for endpoints and access, while also driving vulnerability management and helping teams adopt AI tools safely.
Responsibilities
- IT Support (First Line): Resolve issues, meet SLAs, and keep operations moving.
- Endpoint Management: Manage the full device lifecycle (laptops, desktops, mobiles, VDI) including deployment, configuration, and troubleshooting.
- Patch Management: Maintain updates for endpoints, workstations, cloud servers, and VDI; track patch needs and report status.
- Vulnerability Management: Run vulnerability scans, interpret results, prioritize by risk, and drive remediation to closure.
- Access & Identity: Administer user accounts and access rights; enforce least privilege; handle provisioning and deprovisioning securely.
- Threat Prevention: Support and monitor security controls such as endpoint protection, DLP, email security, and network controls.
- Asset Management: Maintain accurate inventory (what you have, where it is, and who owns it).
- Onboarding & Offboarding: Properly set up new users and revoke access cleanly when users leave.
- AI Enablement & Security: Help teams use AI tools safely; identify risks like prompt injection, data leakage, and insecure integrations; ensure appropriate guardrails.
Requirements
- 3+ years in an IT support or IT operations role.
- Strong experience with Identity & Access Management (IAM), MDM, and endpoint security tools.
- Some exposure to patch management (laptops is acceptable) and willingness to expand scope.
- Prior exposure to vulnerability scanning and a basic understanding of interpreting results.
- Understanding of how workplace AI tools are used and awareness of security risks.
- Ability to translate technical concepts for non-technical stakeholders.
- Highly self-directed and proactive, maintaining momentum without heavy external guidance.
Nice-to-haves
- Deeper experience across broader vulnerability management and enterprise security controls.
About Crypto.com
Crypto.com is a technology and crypto platform company focused on user security. Its Security team covers Security, Privacy, and Security Compliance, led by experienced cybersecurity professionals and guided by recognized leadership and industry standards.
Scraped 4/22/2026