Job Description
Product Owner – Identity & Access Management (IAM)
Location NJ/Remote
We are seeking a Product Owner specializing in Identity & Access Management (IAM) to lead the delivery of authentication and access management capabilities across enterprise and digital platforms.
This role will work closely with security architects, engineering teams, and risk stakeholders to implement secure identity solutions including multi-factor authentication, passwordless authentication, adaptive authentication, and secure session management.
The Product Owner will be responsible for translating IAM strategy into actionable backlog items, managing delivery priorities, and ensuring successful implementation of modern identity platforms.
Key Responsibilities
Product Ownership & Agile Delivery
• Own and manage the IAM product backlog including epics, features, and user stories.
• Translate security requirements and architecture designs into implementation-ready stories.
• Lead Agile ceremonies including sprint planning, backlog refinement, and release planning.
• Work closely with engineering teams to ensure secure and scalable IAM implementations.
Authentication & Access Management Delivery
Lead implementation of IAM capabilities including:
Authentication Controls
• Multi-Factor Authentication (MFA)
• Adaptive / Risk-Based Authentication
• Passwordless authentication (biometrics, passkeys, FIDO2)
• Device-based authentication
Access Management
• Single Sign-On (SSO)
• Identity Federation (SAML, OAuth2, OpenID Connect)
• Role Based Access Control (RBAC)
• Attribute Based Access Control (ABAC)
Session Security
• Secure session management
• Secure browsing capabilities
• Continuous authentication
• Device trust management
IAM Platform Implementation
Support implementation and integration of enterprise IAM platforms such as:
• Okta
• Ping Identity
• ForgeRock
• Microsoft Entra ID (Azure AD)
• Auth0
• CyberArk (Privileged Access Management)
Responsibilities include:
• IAM platform configuration and capability rollout
• Application onboarding to SSO
• MFA policy implementation
• Identity federation with internal and third-party systems
Risk-Based Authentication & Security Integration
Collaborate with security teams to implement risk-aware authentication models, including:
• Behavioral authentication signals
• Device fingerprinting
• Location and network-based risk signals
• Transaction-level authentication
Ensure IAM controls align with enterprise security frameworks and Zero Trust principles.
Integration with Enterprise Platforms
Coordinate IAM integrations across:
• Web and mobile applications
• API gateways
• Cloud platforms
• Enterprise applications (Salesforce, ServiceNow, internal systems)
Stakeholder Management
Work closely with:
• Cybersecurity teams
• Security architecture
• Digital engineering teams
• Risk & compliance teams
• Application owners
to ensure IAM solutions align with security policies and digital platform needs.
Technical Expertise
Strong knowledge of:
Authentication & Identity Protocols
• OAuth 2.0
• OpenID Connect
• SAML
• FIDO2 / WebAuthn
• Passkeys
IAM Capabilities
• Multi-Factor Authentication
• Passwordless authentication
• Adaptive authentication
• Single Sign-On
• Identity federation
• Access control models (RBAC / ABAC)
Security Architecture
• Zero Trust
• Secure identity lifecycle
• Identity governance concepts
Platform Experience (Preferred)
Hands-on implementation experience with:
• Okta
• Ping Identity
• ForgeRock
• Microsoft Entra ID
• Auth0
Preferred Industry Experience
Experience working in regulated industries, such as:
• Financial Services
• Capital Markets
• Banking
• FinTech
Key Skills
• Strong Agile product ownership
• Ability to translate security requirements into engineering tasks
• Experience working with security architects and engineering teams
• Excellent stakeholder communication and prioritization
Success Metrics
• Successful rollout of MFA and passwordless authentication
• Number of applications onboarded to SSO and federation
• Reduction in authentication friction
• Compliance with enterprise security standards
Best Regards,
Deepak Gulia
Sr. Talent Acquisition-USA












