
Cybersecurity product owner
Confidential, Dallas, TX, United States
Job Title: Cybersecurity Epic Owner – Identity & Access Management (IAM) ( Only for USC )
Duration : 12+ Months
Proficiency in Agile methodologies, collaborating effectively with cross-functional teams.
Own IAM Epics from
idea inception through MVP definition, implementation, and value realization
in alignment with
SAFe LPM and ART execution . Partner with
Business Owners, Architects, Cybersecurity Leaders, and Product Management
to define Epic hypotheses, success metrics, and WSJF prioritization. Decompose Epics into
Features and Enablers , ensuring clarity, sequencing, and alignment to ART roadmaps. Drive
PI Planning readiness , clarify dependencies, and support teams during execution. Track and communicate Epic progress, risks, and outcomes via
Lean Portfolio Management (LPM)
forums. Strong hands-on knowledge of: Privileged Access Management (PAM) Directory services (AD, eDirectory, LDAP) CIAM platforms and patterns Lead Epics across the following IAM domains: Privileged Access Management (PAM):
Vaulting, session management, least privilege, service accounts, privileged lifecycle automation. Directory Services
– Active Directory, eDirectory, LDAP, directory modernization and integrations. Enterprise IAM (Workforce IAM):
Authentication, Authorization, SSO, MFA, RBAC/ABAC, lifecycle provisioning. Customer Identity & Access Management (CIAM):
customer authentication, identity federation, consent, privacy, and scalable customer login experiences. Experience with IAM tools such as CyberArk, BeyondTrust, Ping, Azure AD, SailPoint, or similar Experience in cloud-based IAM (AWS, Azure, hybrid environments) Ensure IAM solutions align with
Zero Trust ,
least privilege , and
identity-first security principles . Partner with Architecture to ensure designs are
secure, scalable, and compliant .
#J-18808-Ljbffr
idea inception through MVP definition, implementation, and value realization
in alignment with
SAFe LPM and ART execution . Partner with
Business Owners, Architects, Cybersecurity Leaders, and Product Management
to define Epic hypotheses, success metrics, and WSJF prioritization. Decompose Epics into
Features and Enablers , ensuring clarity, sequencing, and alignment to ART roadmaps. Drive
PI Planning readiness , clarify dependencies, and support teams during execution. Track and communicate Epic progress, risks, and outcomes via
Lean Portfolio Management (LPM)
forums. Strong hands-on knowledge of: Privileged Access Management (PAM) Directory services (AD, eDirectory, LDAP) CIAM platforms and patterns Lead Epics across the following IAM domains: Privileged Access Management (PAM):
Vaulting, session management, least privilege, service accounts, privileged lifecycle automation. Directory Services
– Active Directory, eDirectory, LDAP, directory modernization and integrations. Enterprise IAM (Workforce IAM):
Authentication, Authorization, SSO, MFA, RBAC/ABAC, lifecycle provisioning. Customer Identity & Access Management (CIAM):
customer authentication, identity federation, consent, privacy, and scalable customer login experiences. Experience with IAM tools such as CyberArk, BeyondTrust, Ping, Azure AD, SailPoint, or similar Experience in cloud-based IAM (AWS, Azure, hybrid environments) Ensure IAM solutions align with
Zero Trust ,
least privilege , and
identity-first security principles . Partner with Architecture to ensure designs are
secure, scalable, and compliant .
#J-18808-Ljbffr