VP, Authentication Governance Senior Manager
Listed on 2026-01-12
-
IT/Tech
IT Consultant, IT Project Manager -
Management
IT Project Manager
About The Role
The VP, Authentication Governance Senior Manager will provide overall leadership and oversee the company’s workforce authentication service function. This role reports to the Global Head of Authentication (Identity and Access Management), requires extensive background and overall experience in IAM strategy, architecture, and software development/engineering as well as subject matter expertise in authentication services (both internal workforce and customer) while ensuring appropriate visibility, communication, and governance across key business partners and stakeholders.
The role will require working across organizational boundaries, managing engineering and operations teams, overseeing vendors, driving POCs and negotiations, and interfacing with audit and regulatory teams.
- Plan and execute the delivery of Authentication services (Customer IAM).
- Lead & oversee the design and development of Authentication solutions that enforce applicable organization security policies and access management requirements.
- Lead and oversee the build, configuration, and architecture of one or more authentication platforms, such as Okta/Ping and Azure including integral technology components such as SSO (Single sign-on), registration, identity proofing, multifactor authentication, password resets, etc.
- Demonstrate an understanding of Authentication services and integration with broader security solutions, such as Identity & Access Governance, Privileged Access and broader Cybersecurity services.
- Defines, enhances, and oversees all enterprise-wide authentication processes, controls and follow-up, exception & risk acceptance approvals, and walkthroughs.
- Oversees the development of technical authentication solutions, engaging service owners, architects, project managers, global infrastructure teams, regional IT teams and key IAM product vendors during the lifecycle of solutions delivery.
- Responsible for business requirements to integrate authentication systems with in-house and third‑party applications for provisioning, access requests, and certifications.
- Represents the IAM organization on large scale technology projects implemented outside IAM, regulatory reviews and internal and external audits.
- Ability to confidently articulate business risks and technical challenges to stakeholders.
- Be action oriented:
Taking on new opportunities and tough challenges with a sense of urgency, high‑energy and enthusiasm. - Balance stakeholders:
Anticipating and balancing the needs of multiple stakeholders. - Collaborate:
Building partnerships and working collaboratively within and outside ISO (Information Security Office) organization to meet shared objectives. - Communicate effectively:
Developing and delivering multi‑mode communications that convey a clear understanding of the unique needs of different audiences. - Cultivate innovation:
Creating new and better ways for the organization to be successful. - Be customer focused:
Building strong customer relationships and delivering customer‑centric solutions. - Drive engagement:
Creating a climate where people are motivated to do their best to help the organization achieve its objectives. - Drive results:
Consistently achieving results, even under tough circumstances. - Have a global perspective:
Taking a broad view when approaching issues using a global lens. - Be interpersonal savvy:
Relating openly and comfortably with diverse groups of people. - Manage complexity:
Making sense of complex, high quantity, and sometimes contradictory information to effectively solve problems. - Be able to optimize work processes:
Knowing the most effective and efficient processes to get things done, with a focus on continuous improvement. - Be organizational savvy:
Maneuvering comfortably through complex policy, process, and people‑related organizational dynamics. - Interpret and apply skills to build Authentication solutions to support globally dispersed businesses, personnel, and customers.
- 10+ years of overall experience in (or related experience) Cybersecurity and IAM managing engineering, strategy, process/controls and related services.
- 10+ years’ experience in supporting key IAM…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).