drjobs Product Manager Cryptographic Security Controls -Vice President

Product Manager Cryptographic Security Controls -Vice President

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Plano, TX - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Description

You enjoy shaping the future of product innovation as a core leader driving value for customers guidingsuccessfullaunches and exceeding expectations. Join our dynamic team and make a meaningful impact by delivering highquality products that resonate with clients.

As a Cryptographic SecurityControls Product Manager Vice President you will set the vision for the Key Management Services (KMS) products collaborating with partners stakeholders and customers to define roadmaps. You will guide a product delivery team that is charged with delivering measurable business value building new product features and increasing the efficiency and usability of existing products. In addition you will help develop new ideas based on your contact with customers and prospects. You should be prepared to make decisions with imperfect information while leading with influence. You must possess a unique blend of business and technical savvy that includes a bigpicture vision and the drive to make that vision a reality. You must also enjoy spending time in the industry to understand industry problems and finding innovative solutions for the broader market and our lines of businesses.

Job Responsibilities:

  • Develop and execute product vision and strategy in partnership with our engineering teams and your customers and establish a multiyear roadmap for our products to illustrate our vision and plan into the future.
  • Engage in upfront discovery work leveraging industry best practices to determine the right thing to build by analyzing various market segments and collaborating with leadership to choose the best ones to pursue.
  • Manage the revenue recovery and expenses of the product always striving to strike the optimal balance between features stability and cost efficiencies.
  • Track performance results and recommend changes to our product and processes to create improvement.
  • Thrive in a team environment with good interpersonal skills by collaborating and building relationships with engineers development teams architects operations partners and business clients.
  • Manage vendor engagements in data security space with support from architects and engineering leads
  • Cultivate security culture with your product technology and business colleagues. Products that have the right security culture will strive to prioritize sustainable controls and driving real risk reduction outcomes. Embed threat modelling solutions architecture secure code review into product and application teams so they adopt our control products and create products that are secure from the start.
  • Know your product across its breadth and depth. Be fluent in your products strategy and roadmap as well as its key investment programs. Identify unfamiliar technology components capabilities and business concepts and be selfmotivated to learn all about them applying critical thinking to identify hidden issues along the way.
  • Be your products security thought leader. Learn from your product and cybersecurity teams and share best practice in both directions. Be recognized in your product as the clear point of escalation and subject matter expert for IT Risk and Cyber domains.

Required Qualifications Capabilities and Skills:

  • 5 years of experience or equivalent expertise in product management or a relevant domain area
  • Experienced in designing and implementing cloud services (e.g. IaaS PaaS SaaS etc. offered from public cloud service providers (e.g. AWS Microsoft Azure etc.
  • Cryptographic Security Controls (KMS Encryption Tokenization or similar) experience required
  • Deep understanding of encryption at Rest in Transit and in Use
  • Experience with HSM technologies with ability to apply HSM knowledge towards functional requirements and overall product roadmap
  • Experience with HSM backed Payment systems and PCIrequirements
  • Familiarity with recent Data Protection and Encryption trends
  • Demonstrated use of qualitative and quantitative data to prioritize and drive decisionmaking.
  • Ability to provide direction and guidance on business use cases and requirements for Data Security solutions.
  • Usage of best practice agile scrum development and lean principles.
  • Experienced in the endtoend information technology (IT) processes including architecture design & engineering implementation and operations.

Preferred Qualifications Capabilities and Skills:

  • Experience with enterprisescale software development is a plus.
  • Excellent interpersonal and communication skills including ability to negotiate compromise and demonstrate diplomacy in sensitive situations and to interact effectively with peers and management across diverse cultures.
  • Curious and comfortable holding professional conversations with our target users.
  • Excellent writer and public speaker in front of large senior groups and able to cater messaging to diverse audiences.
  • Demonstrated people skills to interact with staff colleagues crossfunctional teams and third parties.
  • Cloud security certifications (vendor specific) (e.g. AWS Certified Solutions Architect) preferred




Required Experience:

IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.