Product Owner
Apply NowJob details
We are seeking an accomplished Product Owner specializing in cybersecurity, with a profound focus on data protection and cryptography, including PKI, post-quantum crypto, and agile cryptography. Key Responsibilities Spearhead the definition and ownership of the product vision pertaining to cryptography and data protection, in alignment with enterprise security objectives. Collaborate extensively with internal cybersecurity experts, architects, and engineering teams focusing on PKI, post-quantum crypto, agile cryptography, and data encryption. Act as a distinguished subject matter expert and product leader in cybersecurity, shaping technical strategy without the direct management of delivery timelines. Prioritize features and initiatives based on risk assessment, security implications, and regulatory compliance requirements. Curate and refine the product backlog in collaboration with architecture and security stakeholders. Engage actively in architecture reviews, governance discussions, and roadmap planning sessions. Exert influence across cross-functional teams without formal authority, serving as the principal advocate for cybersecurity considerations. Ensure that developed solutions adhere strictly to cryptographic standards and best practices, encompassing PKI, TLS, certificate management, and HSMs. Ideal Profile Accumulated 7-10 years of hands-on experience in cybersecurity, with a notable emphasis on cryptography. Extensive proficiency in PKI, certificate management, encryption methodologies (at rest and in transit), HSMs, post-quantum crypto strategies, and agile cryptography. In-depth familiarity with contemporary advancements such as quantum computing and strategies for cryptographic migration. Track record of success as a Product Owner, Security Architect, or Security Advisor within intricate enterprise settings. Demonstrated capacity to influence technical teams and shape a product vision firmly rooted in security imperatives. Exceptional communication skills and adeptness in engaging stakeholders, adept at translating complex cybersecurity concepts for diverse audiences. Previous exposure to regulated sectors constitutes a notable advantage.
Apply Now