CrawlJobs Logo

Endpoint Management Senior Analyst

sig.biz Logo

SIG Group

Location Icon

Location:

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

You may be our new Endpoint Management Senior Analyst. SIG is the place for you to build something incredible. We are looking for people who are willing to consistently achieve results, even under tough circumstances, employees who create a climate where everyone is motivated to do their best to help the organization achieve its objectives.

Job Responsibility:

  • Provisioning and administration of the Microsoft 365 communication and collaboration platform
  • Plan, implement, automate, and operate flexible workplace technologies (virtualization, on-premises, cloud) on the Windows platform as well as the integration and management of mobile devices
  • Introduce, configure, operate, and monitor the workplace-related IT security systems, considering the overarching IT security architecture and guidelines
  • Implementation, automation, and optimization of the licensing, authentication, and authorization processes in the Microsoft 365 environment
  • Evaluation, test, and specification of the SIG terminal device standard for desktop, notebook, smartphone, and video equipment
  • Prepare and ensure a performant operating system and application deployment process
  • Working in 2nd level tickets according IT Service Management processes and ensuring knowledge transfer to local desktop support and service desk
  • Continuous improvement of desktop-related services according “shift-left” approach

Requirements:

  • Experience with O365 Environment Administration
  • SharePoint Online Admin
  • Microsoft Teams Admin
  • Intune Admin
  • Exchange Online Admin
  • Licensing optimization
  • Conditional Access Configuration
  • Identity management Admin
  • Governance framework Admin
  • Experience with MECM / MEM
  • Experience with Windows 11 (Configuration/Deployment/Support)
  • Experience with Microsoft Active Directory and Hybrid AD-AAD Environments

Nice to have:

  • Experience with M365Apps
  • Any relevant Certification
  • Scripting skills (PowerShell, Python, VBS)
What we offer:
  • Competitive compensation
  • Opportunity to partially work from home
  • Part of a globally successful international company
  • Personal development opportunities
  • Trainings and coaching opportunities from senior team members

Additional Information:

Job Posted:
January 04, 2026

Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Endpoint Management Senior Analyst

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Senior Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
256000.00 - 342000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • Experience with AWS, GCP, or similar cloud platforms
  • Experience in building and delivering projects from start to finish
  • Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Contributions to the security community or open source projects
  • Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution. Participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • health and wellbeing resources
  • paid volunteer days
  • Fulltime
Read More
Arrow Right

Senior Information Security Analyst

We are seeking a highly skilled and technically strong (Senior) Information Secu...
Location
Location
Germany , Munich; Berlin
Salary
Salary:
Not provided
hawk.ai Logo
Hawk
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of hands-on experience in Information Security, IT Security, or System Administration within a B2B tech or SaaS environment
  • Strong technical competence across multiple operating systems (macOS, Windows, Linux) including admin-level experience
  • Experience with identity and access management tools (e.g., JumpCloud, Okta), MDM solutions, and enterprise security platforms
  • Solid understanding of IT security fundamentals, including authentication, endpoint security, encryption, and network basics
  • Familiarity with ISO 27001 or ISMS operations
  • experience supporting audits or certification maintenance
  • Basic security certifications (e.g., CompTIA Security+, CEH) are highly desirable
  • Fluent German and English — mandatory due to regular customer-facing security discussions
  • Ability to articulate complex technical issues clearly to diverse audiences (engineers, customers, auditors, leadership)
  • Strong documentation skills with attention to accuracy and clarity
Job Responsibility
Job Responsibility
  • Respond to security questionnaires, RFPs, and due-diligence requests in collaboration with Sales and Pre-Sales
  • Participate in customer calls to explain Hawk’s security posture and answer technical, compliance, and infrastructure-related questions
  • Represent Hawk’s security capabilities clearly and confidently to regulated financial institutions
  • Support the ongoing operation and improvement of Hawk’s ISMS, ensuring alignment with ISO 27001 controls and underlying processes
  • Assist in internal audits, evidence gathering, and risk assessments
  • Help maintain certification readiness by driving documentation, process adherence, and corrective actions
  • Provide operational support for core IT & security tools, including JumpCloud (SSO/IdP), MDM, endpoint policies, and access management workflows
  • Support the roadmap toward centralized, secure workstation management — monitoring, controlling, and updating all endpoints across macOS, Windows, and Linux
  • Assist in evaluating and managing security-related 3rd party SaaS tools used across the business
  • Monitor the security posture of Hawk’s corporate tools, infrastructure, and integrations
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

Brunswick is in search of a Senior Security Operations Center (SOC) Analyst to j...
Location
Location
United States , Mettawa
Salary
Salary:
87800.00 - 128750.00 USD / Year
herbrucks.com Logo
Herbruck Poultry Ranch
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in cybersecurity, computer science, engineering, or related field
  • Five plus years of experience in SOC monitoring, incident response, or related fields
  • Certifications in Information Security and related disciplines are a plus
  • Demonstrated technical understanding in emerging cybersecurity threats
  • Ability to create detections aligning with the MITRE ATT&CK framework
  • Expertise in SOAR, SIEM, threat intelligence, identity management, and endpoint detection and response tools
  • Strong understanding of threats, vulnerabilities, and incident response principles
  • Excellent judgment and ability to make quick decisions in complex situations
  • Perform tasks independently and work within a fast-paced environment
  • Exceptional written and verbal communication skills across varying levels of the organization
Job Responsibility
Job Responsibility
  • Serve as a subject matter expert for a team of analysts dedicated to monitoring and responding
  • Respond to and investigate cybersecurity incidents, including those that occur off-hours as part of a scheduled on-call rotation
  • Serve as a mentor and escalation point for junior SOC analysts, assisting with day-to-day SOC requirements
  • Identify strengths and areas for improvement within the team to improve skills and knowledgebase
  • Stay current with cybersecurity threats, AI developments, risks, and vulnerabilities that could impact services
  • Create detections aligned with the MITRE ATT&CK framework and recommend improvements to leadership
  • Refine and maintain playbooks, procedures, and guidelines that align with industry best practices
  • Maintain strong partnerships with security engineering, incident response, and IT teams to improve monitoring, workflow, and response capabilities
  • Document and share information with team members to help improve analytical skills
  • Support monitoring and response metrics, KPIs, and service level objectives for security events and incidents
What we offer
What we offer
  • annual discretionary bonus
  • medical
  • dental
  • vision
  • paid vacation
  • 401k (up to 4% match)
  • Health Savings Account (with company contribution)
  • well-being program
  • product purchase discounts
  • Fulltime
Read More
Arrow Right

Senior Incident Response Analyst

Wrike is seeking an experienced Senior Incident Response Analyst to help safegua...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
klaxoon.com Logo
Klaxoon
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Over 5 years of experience in a Senior Incident Response Analyst/SOC/Cybersecurity or similar security-focused role in a software product company
  • Deep understanding of network fundamentals and a wide range of security threats
  • Exceptional analytical and problem-solving skills, with the ability to think critically under pressure
  • Outstanding communication skills, both written and verbal, with the ability to convey complex concepts to technical and non-technical audiences
  • Hands-on experience with leading security information event management (SIEM) and extended detection and response (XDR) platforms (e.g., Rapid7, Splunk, Wazuh, Microsoft Defender for Endpoint, Crowdstrike)
  • Strong experience in log analysis, event correlation, and incident response
Job Responsibility
Job Responsibility
  • Lead the monitoring, analysis, and triage of complex security alerts and events, providing expert guidance to junior team members
  • Assess risk and impact of potential incidents, recommending and overseeing appropriate remediation actions
  • Employ a broad range of advanced security tools and technologies to proactively detect and investigate sophisticated cyber threats
  • Collaborate with and mentor other teams, including incident responders, to ensure timely and accurate escalation and resolution of high-priority cases
  • Oversee documentation and reporting of security incidents, ensuring accuracy, clarity, and timely delivery to relevant stakeholders
  • Drive the ongoing development and enhancement of security monitoring and detection capabilities, introducing best practices and automation where appropriate
  • Stay ahead of the latest security trends, emerging vulnerabilities, and best practices, sharing knowledge and recommendations within the team and across the organization
  • Demonstrated experience functioning at an L3 level, serving as the final escalation point for resolving complex security incidents and issues
  • Mentorship of junior/mid senior analysts, ability to share knowledge
What we offer
What we offer
  • 18 calendar days of paid vacation (12 days of National & Festival holidays (10 fixed, 2 flexible))
  • Sick Leave Compensation (5 Paid Uncertified Sick Days)
  • Menstrual Leave: Twelve (12) days per calendar year. Women employees are eligible for up to 1 day of menstrual leave per month.
  • Parental Leave: 26 Weeks Maternity / 4 Week Paternity
  • 2 Volunteer Days
  • Group Medical Insurance (Employees + Dependents)
  • Term Life Insurance (Rs 50,00,000)
  • Personal Accident Insurance (Rs 50,00,000)
  • Monthly Broadband / Internet Reimbursement (INR 1500)
  • Hybrid Working Model + Complimentary Lunch & Snacks
  • Fulltime
Read More
Arrow Right
New

Senior Information Security Analyst

We are seeking a highly skilled and experienced Senior Information Security Anal...
Location
Location
Canada , Toronto
Salary
Salary:
100000.00 - 110000.00 CAD / Year
https://www.randstad.com Logo
Randstad
Expiration Date
April 17, 2026
Flip Icon
Requirements
Requirements
  • Bachelor’s degree from an accredited college or university or equivalent experience
  • Minimum five years’ experience as an information technology professional with at least three of those in information security
  • Deep knowledge of Data Loss Prevention (DLP) technologies, frameworks, and platforms—particularly Microsoft Purview, Microsoft Defender for Cloud Apps, and Microsoft Defender for Endpoint
  • Proven experience implementing and managing solutions for Data Loss Prevention, Insider Risk Management, Data Security Posture Management, and Conditional Access
  • Strong understanding of data classification, encryption, regulatory requirements, and standards
  • Proven experience managing DLP incidents, governance forums, and program expansion initiatives
  • Familiarity with cybersecurity frameworks such as NIST, ISO 27001, and CIS Controls
  • Experience collaborating with cross-functional teams and senior stakeholders
  • Exceptional analytical, problem-solving, and investigative skills
  • Holds at least one information security certification or actively working towards at least one security certification (e.g. CISSP, CISM)
Job Responsibility
Job Responsibility
  • Design, implement, and manage the end-to-end DLP control to protect sensitive data across endpoints, cloud, email, network, and mobile environments according to identified requirements, developed milestones, and approved program
  • Develop and expand DLP policies, rules, and controls to align with evolving business needs, regulatory requirements, and industry best practices
  • Continuously improve and optimize DLP processes to enhance accuracy, reduce false positives, and improve efficiency
  • Support the expansion of DLP capabilities into emerging technologies, and egress channels
  • Follow the DLP incident response process, collaborating with all stakeholders (i.e., HR, Privacy, and Business Units) to investigate, contain, and remediate data loss incidents
  • Develop and maintain DLP incident playbooks and ensure timely response to alerts
  • Provide detailed analysis and reporting on data loss incidents, root causes, and corrective measures
  • Conduct post-incident reviews and recommend improvements to prevent future incidents
  • Establish, enforce, and regularly review DLP policies, standards, and guidelines to ensure comprehensive coverage of sensitive data across the organization
  • Collaborate with Legal, Compliance, Risk, and other departments to ensure DLP policies align with regulatory requirements (e.g., GDPR, PIPEDA, PCI-DSS, HIPAA) and industry frameworks
What we offer
What we offer
  • Reliability Status Security Clearance – this can only be completed with candidates who receive an offer of employment
  • The cost of submitting these checks will be covered by our client
  • Fulltime
Read More
Arrow Right

Senior Security Operations Analyst

PPRO is seeking a highly motivated and experienced Security Operations Analyst t...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
ppro.com Logo
PPRO GmbH
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong hands-on experience with SIEM platforms, including the creation and tuning of complex detection rules
  • Demonstrable experience with Endpoint Detection and Response (EDR) tools
  • Solid understanding of cloud security principles, CI/CD processes and DevSecOps environments
  • In-depth knowledge of incident response methodologies and best practices
  • A proactive mindset with the ability to take ownership of tasks and projects and drive them to completion
  • Excellent analytical and problem-solving skills, with a keen eye for detail
  • Scripting or programming skills (e.g., Python, PowerShell) for automation and analysis
  • Empathetic, thoughtful and business-focused approach to understand how Security controls impact other business functions and customers
Job Responsibility
Job Responsibility
  • Design, develop and implement custom detection rules, alerts and dashboards within our SIEM platform to identify emerging threats across both end-user and production environments
  • Continuously tune and optimize existing rules to improve detection accuracy and reduce false positives
  • Proactively hunt for threats within our environment by analyzing logs and security data from various sources
  • Conduct thorough investigations of security alerts generated by endpoint detection & response systems, SIEM and cloud platforms
  • Manage the full lifecycle of security events from initial detection and triage to containment, eradication and post-incident analysis
  • Clearly document and report on lessons learned from security events and incidents, design and implement recommendations for improving our security posture
  • Monitor, maintain and enhance our security tooling, ensuring optimal performance and coverage
  • Collaborate with Technology teams to integrate security monitoring and alerting into the CI/CD pipeline
  • Contribute to the development and improvement of security operations procedures and playbooks
  • Innovate, experiment, enhance Security Operations by making use of cloud-native tools, AI and automation to help to build a best of breed SOC
What we offer
What we offer
  • Hybrid working with a 3 days / week on site expectation
  • 28-day holiday allowance
  • Work from abroad policy, enabling employees to work remotely for up to another 30 days per year
  • GBP 1,000 annual budget for professional growth
  • Leadership cafés, on-the-job training
  • Medical insurance (BUPA health care plan)
  • 5% matching pension plan through Now Pensions
  • Enhanced family leave
  • Workplace Nursery Scheme
  • Gym membership contribution
  • Fulltime
Read More
Arrow Right

Cybersecurity Analyst

Unox, market leader in the production of high-end ovens, certified as a Great Pl...
Location
Location
Italy , Cadoneghe, Padova
Salary
Salary:
Not provided
unox.com Logo
UNOX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong analytical and problem-solving skills, with attention to detail
  • A proactive and positive attitude, with a willingness to learn from feedback
  • Curiosity and genuine interest in cybersecurity and IT technologies
  • A structured and responsible approach to tasks, even under time constraints
  • Ability to work effectively in a team-oriented and collaborative environment
  • Effective communication skills in English and Italian, written and spoken
  • 0–2 years of experience (or strong academic background) in IT, systems administration, or cybersecurity
  • Basic knowledge of Microsoft environments (Windows, Microsoft 365, Entra ID)
  • Familiarity with fundamental cybersecurity concepts (e.g. MFA, backups, endpoint protection, phishing)
Job Responsibility
Job Responsibility
  • Support the continuity and daily operations of UNOX’s IT infrastructure under senior supervision
  • Assist in monitoring backup systems and verifying successful executions according to defined policies and SLAs
  • Support configuration and monitoring activities on cybersecurity platforms (e.g. SIEM, XDR, Email Security)
  • Participate in disaster recovery tests and help collect data related to RPO and RTO
  • Provide frontline employee support by responding to and resolving basic IT and security-related issues
  • Collaborate with the internal IT team and the company SOC during security incidents, following established procedures
  • Assist in periodic cybersecurity assessments and remediation activities
  • Support identity and access management activities, including least-privilege and tiered access models
  • Contribute to endpoint and asset management solutions (e.g. MDM), including enrollment, compliance checks, and troubleshooting
  • Help prepare and deliver cybersecurity awareness initiatives and training materials for employees
What we offer
What we offer
  • Flexible Working Hours
  • Work-Life balance initiatives
  • Paid time off & overtime
  • Company canteen
  • Personal and family welfare
  • Health insurance & welfare programs
  • Pension & retirement plans
  • Mentorship & coaching
  • Career growth & training programs
  • Diversity & inclusion policies
  • Fulltime
Read More
Arrow Right