Job Title: Product Owner Identity & Access Management (IAM)
Location: Fort Mill SC
Duration: Long-Term
Job Summary:
We are seeking an experienced Product Owner (PO) to support our Identity and Access Management (IAM) product portfolio. This role is responsible for owning the IAM backlog and roadmap execution translating business and security requirements into well-defined product features and partnering closely with engineering cybersecurity risk operations and business stakeholders. The ideal candidate brings strong Product Owner experience broad IAM domain knowledge and the ability to define requirements grounded in industry best practices while operating effectively in a complex matrixed enterprise environment.
Key Responsibilities:
Product Ownership & Roadmap Execution
- Own and manage the IAM product backlog and roadmap ensuring alignment with enterprise priorities and delivery timelines.
- Lead backlog refinement sprint planning and prioritization activities with engineering teams.
- Ensure features and enhancements are clearly defined sequenced and ready for development. Requirements Definition & IAM Domain Expertise
- Translate business security and operational needs into clear functional and non-functional requirements.
- Apply IAM industry best practices when defining requirements including:
- Authentication and authorization policies o Session timeout and re authentication behaviours
- Account lockout thresholds and retry limits o MFA and step up authentication requirements
- Identity lifecycle and access governance rules
- Provide strong technical and domain guidance while partnering with solution and architecture teams. Stakeholder Management & Communication
- Serve as the primary point of contact for IAM product requirements priorities and trade-off decisions.
- Manage stakeholder engagement and communication across Technology Cybersecurity Risk Operations and Business teams.
- Ensure alignment on scope priorities dependencies and acceptance criteria. Delivery Support & Quality
- Partner with engineering and QA teams to validate solutions against requirements and acceptance criteria.
- Support UAT release planning and deployment readiness activities.
- Ensure delivered capabilities meet standards for security resiliency performance and usability. Analysis & Continuous Improvement
- Apply strong analytical thinking to evaluate options assess risk and support prioritization
Job Title: Product Owner Identity & Access Management (IAM) Location: Fort Mill SC Duration: Long-Term Job Summary: We are seeking an experienced Product Owner (PO) to support our Identity and Access Management (IAM) product portfolio. This role is responsible for owning the IAM backlog and ro...
Job Title: Product Owner Identity & Access Management (IAM)
Location: Fort Mill SC
Duration: Long-Term
Job Summary:
We are seeking an experienced Product Owner (PO) to support our Identity and Access Management (IAM) product portfolio. This role is responsible for owning the IAM backlog and roadmap execution translating business and security requirements into well-defined product features and partnering closely with engineering cybersecurity risk operations and business stakeholders. The ideal candidate brings strong Product Owner experience broad IAM domain knowledge and the ability to define requirements grounded in industry best practices while operating effectively in a complex matrixed enterprise environment.
Key Responsibilities:
Product Ownership & Roadmap Execution
- Own and manage the IAM product backlog and roadmap ensuring alignment with enterprise priorities and delivery timelines.
- Lead backlog refinement sprint planning and prioritization activities with engineering teams.
- Ensure features and enhancements are clearly defined sequenced and ready for development. Requirements Definition & IAM Domain Expertise
- Translate business security and operational needs into clear functional and non-functional requirements.
- Apply IAM industry best practices when defining requirements including:
- Authentication and authorization policies o Session timeout and re authentication behaviours
- Account lockout thresholds and retry limits o MFA and step up authentication requirements
- Identity lifecycle and access governance rules
- Provide strong technical and domain guidance while partnering with solution and architecture teams. Stakeholder Management & Communication
- Serve as the primary point of contact for IAM product requirements priorities and trade-off decisions.
- Manage stakeholder engagement and communication across Technology Cybersecurity Risk Operations and Business teams.
- Ensure alignment on scope priorities dependencies and acceptance criteria. Delivery Support & Quality
- Partner with engineering and QA teams to validate solutions against requirements and acceptance criteria.
- Support UAT release planning and deployment readiness activities.
- Ensure delivered capabilities meet standards for security resiliency performance and usability. Analysis & Continuous Improvement
- Apply strong analytical thinking to evaluate options assess risk and support prioritization
View more
View less