Product Owner - Cybersecurity

Overview

Remote
Depends on Experience
Contract - W2
Contract - Independent
Contract - 12 Month(s)
No Travel Required

Skills

Product Management
Product Ownership
Product Strategy
Cyber Security
DLP
IDPS
Information Security
Auditing
Internal Auditing
Enterprise Architecture
Endpoint Protection
Regulatory Compliance
SAFE
WAF
Threat Modeling
Security Controls
Security Operations
Security Analysis

Job Details

Must Have:
Perimeter Security controls -Experience with integration and operational processes to support these tools
Security Technology Evaluation & Integration -Experience with selecting and implementing tools like ZTNA, WAF, IDPS, DLP, and XDR across hybrid environments.
Zero Trust Architecture Expertise -Understanding of Zero Trust principles, including identity-centric access, micro segmentation, and continuous verification.

Skills, & Abilities Required:

  • Bachelor's degree in a related field or equivalent education and work experience.
  • Experience in IT and cybersecurity, with at least 4+ years in product ownership or engineering roles.
  • Lean Six Sigma certification (Green Belt, Black Belt) desired.
  • Product management background preferred; ability to interact and influence within the organization.
  • Experience in Zero Trust principles, perimeter security technologies.
  • Experience with WAF/BOT management, NGFW, and endpoint protection.
  • Ability to consult and articulate key messages to all levels within the organization.
  • Basic business acumen and understanding of business processes related to products and customers.
  • Experience working in Agile or SAFe development a plus.
  • Ability to promote a work environment that fosters creative thinking and innovation.
  • Collaborative with strong intellectual curiosity and creative problem-solving.
  • Good analytical skills with ability to present well-thought-out, simple solutions.
  • Self-motivated and able to work independently and with different teams in a fast-paced environment.

Job Profile Summary:
The Information Security Senior Product Owner (Technical) will collaborate with other Product Owners, Technology, Fraud, and other key partners. Drive the strategic direction, assessment, selection, and implementation of cybersecurity technologies. This role is pivotal in shaping the enterprise s Zero Trust architecture and perimeter defense strategy, ensuring scalable, secure, and policy-driven solutions across hybrid environments.
General Function:
Responsible for driving the prioritization, product vision and roadmap for Zero Trust and perimeter security initiatives to align with enterprise risk and compliance goals. Support the assessments, selection and implementation of cybersecurity tools (e.g., ZTNA, WAF, IDPS). Act as the bridge between business, engineering, and security teams to deliver secure, high-impact solutions. Monitor performance and threat trends to refine product features and drive innovation.

Essential Duties & Responsibilities:

  • Strategic Product Ownership

Maintain the product vision and roadmap for Zero Trust and perimeter security initiatives.

Align product strategy with enterprise risk reduction goals, compliance mandates, and Information Security priorities.

Drive cross-functional collaboration across architecture, infrastructure, IAM, and security operations teams.

  • Technology Evaluation & Selection

Support the assessments of cybersecurity technologies including ZTNA, WAF, IDPS, DLP, and XDR to validate solutions against enterprise requirements.

  • Implementation & Integration

Oversee deployment, ensure secure integration of selected technologies into enterprise architecture with minimal disruption.

Operationalize selected technologies for transition to operation teams

  • Security Control Design

Ensure the enforce of perimeter preventive controls

Support the establishment of baseline Zero Trust architectural patterns

  • Governance & Compliance

Ensure product compliance with lifecycle management, audit remediation, and internal control frameworks.

Provide technical support to regulatory agencies, external auditors, and internal audit teams.

  • Threat Modeling

Conduct security research and threat modeling to identify design defects, vulnerabilities and recommend mitigations.

Stakeholder Engagement

Act as the primary liaison between business units, engineering teams, and security leadership.

Communicate product status, risks, and priorities to stakeholders and executive sponsors.

  • Continuous Improvement

Stay current with emerging threats, technologies, and best practices.

Drive innovation in security design, automation, and adaptive controls.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Javen Technologies, Inc