What are the responsibilities and job description for the JAMF position at MARICI Solutions GmbH?
Job Overview:
We are seeking a JAMF Administrator to join our IT team. The ideal candidate will be responsible for managing and maintaining the JAMF Pro environment, ensuring smooth deployment and management of Apple devices across the organization. This includes setting up, automating, and troubleshooting macOS, iOS, and iPadOS devices using JAMF Pro.
Key Responsibilities:- JAMF Pro Management: Administer the JAMF Pro server, including configuration, monitoring, and updates.
- Device Enrollment & Configuration: Enroll Apple devices into the system and manage configurations (e.g., Wi-Fi, VPN, security settings).
- Automated Deployments: Create, test, and deploy policies, profiles, and software to Apple devices using JAMF Pro.
- Scripting: Develop and maintain custom scripts (using Bash, Python, or JAMF JS) for automation tasks such as app deployment, configuration updates, and troubleshooting.
- System Monitoring & Maintenance: Monitor the health and status of enrolled devices, ensuring all systems are up-to-date and compliant with organizational policies.
- User Support: Provide technical support for end users regarding their Apple devices and software, including troubleshooting issues and resolving them promptly.
- Reporting & Documentation: Generate reports on device compliance, inventory, and software updates. Maintain detailed documentation of JAMF Pro workflows, policies, and procedures.
- Security Management: Ensure the security of Apple devices by enforcing compliance policies, security configurations, and monitoring for vulnerabilities.
- Collaboration: Work closely with other IT teams to integrate JAMF Pro with other management and monitoring tools, as well as support cross-departmental initiatives.
- Proven experience in Apple device management, preferably with JAMF Pro with 400 Certification.
- Familiarity with macOS, iOS, iPadOS, and tvOS devices.
- Strong understanding of device management concepts such as configuration profiles, software deployment, and security policies.