End User Computing Security Engineer I
Company: Texas Health Resources
Location: Arlington, TX 76011 (Remote)
Type: Full-time
Remote: Yes
Posted: 2026-05-01
About this role
End User Computing Security Engineer I – IT End User Computing
*Bring your passion to Texas Health so we are Better + Together*
Work location: Texas Health Resources, 612 East Lamar Blvd, Arlington, TX 76011
(Primarily Remote – must live in the Dallas-Fort Worth Metroplex)
Work hours: Full-time, Day shift; 40 hours, Monday – Friday, 8:00am to 5:00pm
IT End User Computing highlights:
- Innovative, collaborative and fast-paced environment
- Opportunities to learn and advance in roles
- Supportive and transparent leadership
- Work from home life balance
- Inclusive and supportive team attitude
Here’s What You Need
*Education*
- Bachelor's Degree Computer Science, Information Technology/Systems, Business or related field OR 4 years relevant experience in lieu of a degree. (Required)
*Experience*
- 6 Months experience working in a large enterprise environment managing end points, specifically security products, including antivirus, disk encryption on windows
- Remediation of HRV (High Risk Vulnerabilities) experience (Highly Preferred)
- Anti-virus and EDR experience (Preferred)
*Licenses/Certifications*
• CISSP - Certified Information Systems Security Professional Upon Hire (Highly Preferred) And
• MCSA - Microsoft Certified System Administrator Upon Hire (Preferred)
What You Will Do
This position works daily on the End Point Security for user devices. This includes working with Anti-Virus and Endpoint Detection and Resolution (EDR) applications such as McAFee, Cylance, and Windows Defender; disk encryption solutions (Microsoft BitLocker and McAfee); and tracking systems (Computrace/Absolute) for Microsoft Windows devices. Troubleshoot client agent issues, reporting , and managing exception processes. Daily management of security audits and corresponding remediation. Requires the ability to update SCCM/Tanium and GPO to roll out updates and changes to the security configuration of devices. The devices can include physi...