drjobs End User Specialist العربية

End User Specialist

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Jobs by Experience drjobs

Not Mentionedyears

Job Location drjobs

Abu Dhabi - UAE

Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Nationality

Emirati

Gender

Male

Vacancy

1 Vacancy

Job Description

Roles and responsibilities

Education

  • Bachelor's degree in Computer Science, Information Technology or Network Security

Required Experience

  • Fresh graduates.

Required Skills

  • Nexthink, ServiceNow Secondary, desktop support
  • End User Devices (EUDs) refer to the computing devices and hardware used by individuals to interact with networks, applications, and systems. These devices are essential for day-to-day operations in businesses and are typically the point of access to an organization's technology infrastructure. End user devices can be used to access applications, work with data, and perform tasks that are integral to both personal and professional functions.

    Types of End User Devices

  • Desktops:

    • Traditional, stationary personal computers used for office work, data processing, software development, design, etc.
    • Typically used in offices, labs, and locations where mobility is not necessary.
  • Laptops:

    • Portable computing devices used for a wide variety of tasks, offering mobility with similar functionality as desktops.
    • Commonly used by remote workers, traveling employees, and those who require flexible work environments.
  • Smartphones and Tablets:

    • Mobile devices that allow users to access emails, browse the web, use apps, and even work on documents.
    • Smartphones often serve as a major point of contact for personal and professional tasks.
  • Workstations:

    • High-performance computers used for specialized tasks like video editing, CAD design, or complex computations.
    • Often used by engineers, scientists, and designers who need significant computational power.
  • Thin Clients:

    • Devices with minimal processing power, where most data processing happens on a centralized server (server-based computing).
    • Typically used in environments where high security or centralized management is needed.
  • Virtual Desktops (VDI):

    • A virtual machine that provides a desktop computing environment to users, enabling them to access applications and files remotely.
    • Often deployed in cloud environments or enterprise IT setups for centralized control and security.
  • IoT Devices:

    • Internet of Things devices like smart printers, scanners, or other peripherals that users interact with.
    • These can include devices such as smart thermostats, security cameras, and devices used for data collection in specific industries.
  • Printers and Peripherals:

    • Devices such as printers, scanners, monitors, and input devices like keyboards, mice, and webcams, which enhance the functionality of the main end user device.

Desired candidate profile

  • Security:

    • EUDs are often targets for cyberattacks, such as malware, ransomware, and phishing attacks.
    • Organizations must implement strong security protocols, including encryption, antivirus software, firewalls, and multi-factor authentication (MFA) to protect end user devices from threats.
    • Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) tools are used to enforce security policies across various devices in the organization.
  • Device Management:

    • Centralized management of EUDs is essential for organizations to ensure compliance with company policies, software updates, and security patches.
    • Automated device provisioning, monitoring, and maintenance can be done via endpoint management tools.
    • Mobile Device Management (MDM) solutions allow IT teams to remotely manage and monitor mobile devices.
  • Data Access and Storage:

    • EUDs often require secure and efficient methods for accessing data and files, either from local storage or centralized servers/cloud storage.
    • Ensuring proper access controls, data encryption, and backup procedures for data accessed via EUDs is critical.
  • User Experience (UX):

    • The devices need to provide a smooth and efficient user experience, which includes ease of use, sufficient performance, and compatibility with applications.
    • Device performance, operating system, and the ability to run necessary applications are key factors in user satisfaction.
  • Cost Management:

    • Managing the cost of purchasing, maintaining, and replacing end user devices is a significant concern for businesses.
    • Companies may adopt a "Bring Your Own Device" (BYOD) policy, where employees use their personal devices for work, though this brings additional security and management challenges.
  • Remote Work and Mobility:

    • With the rise of remote work, ensuring that EUDs can securely connect to corporate networks via Virtual Private Networks (VPNs) or other secure access methods is essential.
    • Cloud-based solutions and remote desktop tools (e.g., VDI and RDS - Remote Desktop Services) allow users to access work environments from any device, anywhere.
  • Compliance and Regulatory Issues:

    • Many industries (e.g., healthcare, finance) have strict regulations around the handling of data, including specific rules for the use and protection of end user devices.
    • Organizations must implement compliance measures for EUDs to ensure they meet regulatory standards like GDPR, HIPAA, or PCI DSS.

Employment Type

Full-time

Company Industry

Accounting

Department / Functional Area

Information Technology (IT)

About Company

Report This Job
Disclaimer: Drjobs.ae is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.