Product Owner Iam Apply
Product Owner IAM - (NY, FL or SD) location
on site in any of the 3 locations listed
6 to 12 months
We are seeking a Product Manager / Product Owner specializing in Identity & Access Management (IAM) WITH BOTH FUNCTIONAL AND TECHNICAL ARCHITECHTURE EXPERTISE in access management, rather than just a functional expert. to lead the design, development, and delivery of modern authentication and access management capabilities. The role will focus on multi-factor authentication (MFA), passwordless authentication, adaptive access controls, and secure browsing experiences across enterprise and customer-facing platforms.
The candidate will work closely with security, engineering, risk, compliance, and digital product teams to deliver secure, scalable identity solutions that enhance user experience while maintaining strong security controls.
This role is critical in building next-generation authentication platforms that enable secure digital access while reducing friction for users.
Key Responsibilities
Product Strategy & Roadmap
Define and execute the IAM product roadmap covering authentication, authorization, identity lifecycle, and access governance.
Drive adoption of modern authentication standards such as passwordless authentication, adaptive MFA, and risk-based authentication.
Identify opportunities to enhance security posture while improving user experience across digital channels.
Identity & Authentication Capabilities
Lead delivery of core IAM capabilities including:
Authentication
Multi-Factor Authentication (MFA)
Adaptive / Risk-Based Authentication
Passwordless Authentication (Biometrics, FIDO2, Passkeys)
Access Management
Single Sign-On (SSO)
Identity Federation (SAML, OIDC, OAuth2)
Role Based Access Control (RBAC)
Attribute Based Access Control (ABAC)
Secure Access & Browsing
Secure browsing and session protection
Continuous authentication
Behavioral analytics driven access decisions
Security & Risk Integration
Work with cybersecurity and risk teams to implement risk-based authentication models that dynamically adjust authentication requirements based on:
o Device posture
o Location and network
o User behavior
o Transaction risk

