Endpoint Security Master
Listed on 2026-01-01
-
IT/Tech
Cybersecurity, Systems Engineer
Job Title
Endpoint Security Master
Job DescriptionThis role has been designed as a hybrid/onsite position with an expectation that you will work on average 2 days per week from an HPE office, primarily from an HPE office. The Endpoint Security Master is a customer-facing role that assists the Endpoint Security team in overseeing the deployment, availability, and optimization of endpoint security tools managed by other team members.
At the Master level, this role is responsible for driving the overall security strategy for all organizational endpoints—including Windows, Linux, Mac, and Cloud environments—designing and implementing comprehensive solutions that secure every aspect of endpoint infrastructure.
The candidate will ensure that the organization has the appropriate capabilities, processes, and controls in place to protect endpoints against evolving threats, working closely with cross‑functional teams to integrate best‑in‑class security practices. While expertise in Endpoint Detection and Response (EDR) remains vital, the role expands to encompass broader endpoint security architecture, policy design, and continuous improvement across device types and platforms.
Key Responsibilities- Endpoint Security Strategy & Architecture:
Design, implement, and continuously improve holistic security controls and processes for endpoints across the organization, addressing vulnerabilities, compliance, and operational risk. - Tool Oversight & Capability Management:
Assist the Endpoint Security team in overseeing other team members who manage the availability, deployment, and optimization of endpoint security tools, ensuring the organization is equipped with the necessary capabilities to secure endpoints. - Platform & Policy Leadership:
Lead configuration and management of EDR platforms (e.g., Crowd Strike Falcon, Sentinel One) and other enterprise security tools, aligning deployment and prevention policies with the organization’s evolving security posture. - Incident Support &
Collaboration:
Collaborate with Security Analysts, Incident Responders, IT, Network, and System Administration teams to integrate security solutions, support investigations, and ensure optimal functionality for threat detection, response, and compliance. - Documentation & Knowledge Sharing:
Develop and maintain comprehensive documentation for endpoint security configurations, processes, and best practices; mentor and train team members and end‑users on security principles and procedures. - Security Recommendations:
Provide strategic recommendations for secure endpoint configurations, including oversight for related platforms (.g., Zscaler) and guidance on emerging security technologies and trends.
- 8+ years of extensive cyber and IT security expertise, including hands‑on experience designing and implementing endpoint security controls at scale.
- Deep, hands‑on expertise with a leading EDR platform (e.g., Crowd Strike Falcon, Sentinel One) in an enterprise environment.
- Master‑level knowledge of Windows, macOS, and Linux operating systems and security features.
- Advanced experience with cloud‑hosted endpoints, including a strong understanding of core Kubernetes concepts such as Pods, Nodes, Name spaces, Deployments, and Daemon Sets.
- Proficiency in scripting languages for automation and analysis (e.g., Python, Power Shell, Bash).
- Strong understanding of network protocols and host‑based firewalls.
- Experience with the technical delivery of projects, ensuring successful implementation and deployment.
- Fluent in English.
- Mentoring:
Fosters personal and professional growth of colleagues, encouraging innovative thinking and leadership in security solutions. - Influence:
Communicates complex security concepts confidently and adjusts messaging for varied audiences. - Expertise:
Develops and shares new organizational knowledge, establishes best practices, and is recognized as a domain leader in endpoint security. - Accountability, Action Planning, Active Learning, Active Listening, Agile Methodology, Bias, Business, Coaching, Creativity, Critical Thinking, Data Analysis Management, Design Thinking, Development Methodologies, Empathy,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).