Overview
Skills
Job Details
Must Have:
Perimeter Security controls -Experience with integration and operational processes to support these tools
Security Technology Evaluation & Integration -Experience with selecting and implementing tools like ZTNA, WAF, IDPS, DLP, and XDR across hybrid environments.
Zero Trust Architecture Expertise -Understanding of Zero Trust principles, including identity-centric access, micro segmentation, and continuous verification.
Skills, & Abilities Required:
- Bachelor's degree in a related field or equivalent education and work experience.
- Experience in IT and cybersecurity, with at least 4+ years in product ownership or engineering roles.
- Lean Six Sigma certification (Green Belt, Black Belt) desired.
- Product management background preferred; ability to interact and influence within the organization.
- Experience in Zero Trust principles, perimeter security technologies.
- Experience with WAF/BOT management, NGFW, and endpoint protection.
- Ability to consult and articulate key messages to all levels within the organization.
- Basic business acumen and understanding of business processes related to products and customers.
- Experience working in Agile or SAFe development a plus.
- Ability to promote a work environment that fosters creative thinking and innovation.
- Collaborative with strong intellectual curiosity and creative problem-solving.
- Good analytical skills with ability to present well-thought-out, simple solutions.
- Self-motivated and able to work independently and with different teams in a fast-paced environment.
Job Profile Summary:
The Information Security Senior Product Owner (Technical) will collaborate with other Product Owners, Technology, Fraud, and other key partners. Drive the strategic direction, assessment, selection, and implementation of cybersecurity technologies. This role is pivotal in shaping the enterprise s Zero Trust architecture and perimeter defense strategy, ensuring scalable, secure, and policy-driven solutions across hybrid environments.
General Function:
Responsible for driving the prioritization, product vision and roadmap for Zero Trust and perimeter security initiatives to align with enterprise risk and compliance goals. Support the assessments, selection and implementation of cybersecurity tools (e.g., ZTNA, WAF, IDPS). Act as the bridge between business, engineering, and security teams to deliver secure, high-impact solutions. Monitor performance and threat trends to refine product features and drive innovation.
Essential Duties & Responsibilities:
- Strategic Product Ownership
Maintain the product vision and roadmap for Zero Trust and perimeter security initiatives.
Align product strategy with enterprise risk reduction goals, compliance mandates, and Information Security priorities.
Drive cross-functional collaboration across architecture, infrastructure, IAM, and security operations teams.
- Technology Evaluation & Selection
Support the assessments of cybersecurity technologies including ZTNA, WAF, IDPS, DLP, and XDR to validate solutions against enterprise requirements.
- Implementation & Integration
Oversee deployment, ensure secure integration of selected technologies into enterprise architecture with minimal disruption.
Operationalize selected technologies for transition to operation teams
- Security Control Design
Ensure the enforce of perimeter preventive controls
Support the establishment of baseline Zero Trust architectural patterns
- Governance & Compliance
Ensure product compliance with lifecycle management, audit remediation, and internal control frameworks.
Provide technical support to regulatory agencies, external auditors, and internal audit teams.
- Threat Modeling
Conduct security research and threat modeling to identify design defects, vulnerabilities and recommend mitigations.
Stakeholder Engagement
Act as the primary liaison between business units, engineering teams, and security leadership.
Communicate product status, risks, and priorities to stakeholders and executive sponsors.
- Continuous Improvement
Stay current with emerging threats, technologies, and best practices.
Drive innovation in security design, automation, and adaptive controls.