Role : IT Security Engineer Location : Chicago, IL (Hybrid)
Summary We re expanding our Infrastructure and Security Engineering team and looking for a Security Engineer who thrives in a hands-on, fast-paced environment. You ll help maintain the health and security of our Microsoft-based ecosystem focusing on endpoint management, Intune device posture, identity hygiene, and office network security.
Responsibilities :
- Monitor and maintain endpoint health using Microsoft Intune, SentinelOne, and related tools
- Troubleshoot device enrollment, compliance, authentication, and policy issues
- Support identity hygiene and access control improvements in Microsoft Entra ID (Azure AD)
- Participate in security incident triage and remediation of posture deviations
- Execute runbooks, remediation playbooks, and endpoint security tasks
- Support physical office network and security infrastructure (Meraki switches, access points, SD-WAN)
- Manage the lifecycle of endpoints builds, retirements, and return-to-service
- Maintain device inventory accuracy and contribute to automation and documentation improvements
Hands-on Experience :
8 years of experience in IT infrastructure, endpoint management, or security operationsWorking knowledge of Microsoft 365, Intune device management, and Azure AD / Entra IDSolid troubleshooting skills for Windows endpoints and Conditional Access policiesBasic IP networking knowledge and familiarity with the Meraki dashboardStrong attention to detail and a consistent, disciplined approach to operationsRequirements :
Bachelor s degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent experience)Relevant certifications preferred : Microsoft Certified : Endpoint Administrator Associate, Microsoft Certified : Security, Compliance, and Identity Fundamentals, CompTIA Security+, Cisco Meraki or Networking certificationPowerShell scripting experience (preferred)Familiarity with Shared PC Mode, frontline devices, or kiosk setups (preferred)Exposure to zero-trust security models and modern identity access patterns (preferred)Experience supporting change management or security incident processes (preferred)