Security IT Support Engineer
Crypto.com
AI Summary
The vacancy is well-structured with clear responsibilities and compensation, but could improve on tech stack details and social media presence.
Description
Join Crypto.com as a Security IT Support Engineer, ensuring user security through IT support, endpoint management, and vulnerability management in a remote role.
At Crypto.com, our dedication to user security is led by our highly experienced Security Team.
Comprising an international roster of seasoned cybersecurity experts, our team leads the company's Security, Privacy, and Security Compliance endeavors.
The team includes holders of international patents for technologies integrated in our security architecture.
Under the stewardship of a distinguished CISO recognized by the Forbes Technology Council and among the Global Top 100 CISOs, our team has consistently championed industry standards, acquiring certifications like ISO27001, ISO27701, ISO22301, PCI:DSS 3.2.1 (Level 1), NIST Tier 4, and SOC 2 Type II, in addition to the MPI License from Singapore MAS.
Our Chief Information Security Officer reports directly to the CEO, underscoring the prioritization of security in our organization's hierarchy.
Our Security Team not only places great emphasis on credentials and expertise but also deeply values hands-on experience, rapid cognition, and dynamic learning.
The challenges in the world of crypto are ever-evolving, and as such, our team prides itself on quick adaptability and robust teamwork, ensuring that we stay ahead of potential threats and always safeguard our user base.
## What you'll do
- •Be the first line of support for the organisation.
Resolve issues, hit SLAs, and keep things moving.
- •Own the full lifecycle of our devices — laptops, desktops, mobiles, and virtual desktops.
Deployment, configuration, troubleshooting, all of it.
- •Keep endpoints, workstations, cloud servers, and VDI environments up to date.
Track what needs patching, get it done, and report on it.
- •Run regular vulnerability scans across our environment.
Understand what the results mean, prioritise by risk, and drive remediation to closure.
- •Manage user accounts and access rights.
Enforce least privilege.
Make provisioning and deprovisioning slick and secure.
- •Help implement and monitor our security controls — endpoint protection, DLP, email security, network controls.
Keep an eye on what's happening.
- •Know what we have, where it is, and who has it.
Keep the inventory accurate.
- •Set people up properly when they join and make sure access is cleanly revoked when they leave.
- •Work with teams to help them adopt AI tools safely.
Spot risks like prompt injection, data leakage, or insecure integrations.
## Conditions
- •Competitive salary
- •Medical insurance package with extended coverage to dependents
- •Attractive annual leave entitlement including: birthday, work anniversary
- •Flexi-work hour and hybrid or remote set-up
- •Aspire career alternatives through us.
Our internal mobility program can offer employees a diverse scope.
- •Work Perks: crypto.com visa card provided upon joining
- •Our Crypto.com benefits packages vary depending on region requirements, you can learn more from our talent acquisition team.
Requirements
- •3+ years in an IT support or IT operations role
- •Solid experience with identity and access management, MDM, and endpoint security tools
- •Some exposure to patch management — even if it's mostly been laptops, that's fine.
We care that you understand the concept and are willing to grow into the broader scope.
- •You've come across vulnerability scanning before and have a basic idea of what the results mean.
- •You understand what AI tools are doing when people use them at work, and you can think about the security angle
- •Skilled at translating complex technical concepts into clear, accessible language for non-technical stakeholders
- •Highly self-directed professional who anticipates needs and ensures project momentum without requiring external follow-up.
**Nice-to-Haves**
- •IT or security certifications (CISSP, CompTIA Security+, AWS, Microsoft Certified, etc.)
- •Experience with physical office IT setup — networking gear, workstations, cabling
- •Basic scripting ability (Python, Bash, PowerShell) to automate the repetitive stuff
- •Exposure to LLM security concepts — prompt injection, data leakage, agentic risks — even from your own reading or research
- •Worked in a fast-paced or high-security environment before