PowerToFly
Recent searches
  • Events
  • Companies
  • Resources
  • Log in
    Don’t have an account? Sign up
Filters
Clear All
Advanced filters
Job type
  • Reset Show results
Date posted
  • Reset Show results
Experience level
  • Reset Show results
Company
  • Reset Show results
Skills
  • Reset Show results
Clear All
Cancel Show Results
Active filters:
Results 14657 Jobs

Wondering why you’re not getting hired?

Take our 3-min quiz and find out!

  • See what’s holding you back
  • Know exactly what to fix
  • Get a plan to move forward
Take the Quiz!
Loading...
Loading more jobs...

No more jobs to load

No more jobs to load

IAM Product Owner
Save Job
Cummins Inc.

IAM Product Owner

Onsite United States
Posted 8 hours ago
Save Job

Job Details

DESCRIPTION

Watch this video to learn more about Cummins Inc.

We are looking for a talented Cybersecurity Engineer Manager to join our team specializing in Systems/Information Technology for our Corporate organization in Atlanta, GA .

In this role, you will make an impact in the following ways:

  • Drive the successful execution of cybersecurity engineering initiatives that strengthen the organization’s overall security posture.
  • Implement and enforce security policies, standards, and data privacy principles to reduce risk across all information systems.
  • Apply industry frameworks and compliance standards to ensure engineering solutions align with organizational and regulatory requirements.
  • Build and improve engineering processes that integrate cybersecurity technologies into daily IT and business operations.
  • Provide technical leadership to ensure systems, applications, and infrastructure are designed and implemented securely.
  • Serve as a trusted partner to business and IT teams, embedding security into projects and advising on risk mitigation.
  • Manage engineering resources, budgets, and project costs to ensure efficient delivery of security solutions.
  • Lead, coach, and develop a high-performing cybersecurity engineering team focused on continuous improvement and technical excellence.

RESPONSIBILITIES

Competencies:

  • Security & Compliance Principles - Applies standards, tools, and best practices to embed security, privacy, and compliance into the design/build/test/operate lifecycle for products, services, apps, systems, software, and configurations—balancing protection, efficiency, and cost.
  • Programming Principles - Applies programming languages, frameworks, and patterns to design, write, configure, test, and maintain software/solutions/systems that are efficient, secure, scalable, and reliable.
  • Data Principles - Governs, models, secures, implements, and observes data flows to ensure integrity, quality, and compliance—enabling trusted, scalable, cost-conscious data use.
  • Solution Design - Translate business requirements into integrated designs, architectures, patterns, and system interactions that deliver customer value and align with enterprise standards and subject-matter platforms.
  • System Architecture- Creates and evolves architecture system blueprints developing reusable patterns and roadmaps to ensure scalability, resilience, security, and long-term efficiency.
  • Demonstrating Mastery - Maintains essential knowledge and proficiency in relevant domains, tools, technologies, methodologies, or frameworks through targeted credentials and rigorous proficiency, future-proofing organizational skills against strategic needs.
  • Strategic and Innovative Thinking - Evaluates business and technology trends, anticipates future needs, develops creative approaches, and frames innovations to shape strategy and create durable value with cost-aware innovation.
  • Technical Passion & Drive - Models curiosity and excitement for technology by self-initiating continuous development, experimenting with emerging technologies, and identifying insertion opportunities that accelerate business performance.
  • Driving Effective Outcomes - Takes ownership, acts with urgency, and initiates action to turn goals into clear plans, decisions, guardrails, and cadences while navigating ambiguity and change to drive momentum and deliver consistent results.
  • Engaging with Impact - Communicates with clarity and purpose to align stakeholders, foster collaboration, build trust, and influence coordinated action across teams and functions to accelerate outcomes.
  • Values Differences - Recognizing the value that different perspectives and cultures bring to an organization.
  • Ensuring Customer Success - Embraces a customer-first mindset to deliver outcomes by linking customer needs and business priorities to aligned solutions, delivery, adoption, satisfaction, and realized value through sustained engagement that builds partnership and trust.
  • Manages People & Teams - Builds inclusive teams that empower ownership, deepen capabilities, and ensure fair, timely performance accountability, creating an environment where people can deliver their best work and top performance.
  • Directs Work - Creates conditions for team success with clear goals, priorities, work plans, standards, effective processes, resourcing, and governance to enable fast, empowered, accountable, and quality execution.

Education, Licenses, Certifications:

  • College, university, or equivalent degree in Computer Science, Information Technology, Engineering, or related subject, or relevant equivalent experience required.
  • Global Information Assurance Certification (GIAC) Security Essentials Certification, GIAC Security Leadership Certification, Information Systems Audit and Control Association (ISACA) Certified Information Security Manager, Microsoft Certified Systems Engineer: Security, or Certified Information Systems Security Professional (CISSP) certification preferred.
  • This position may require licensing for compliance with export controls or sanctions regulations.

Experience:

  • Understanding of the capabilities and configuration of industrial cybersecurity controls and solutions across multiple facets; for example: asset management, vulnerability management, anomaly detection, identity and access management, network security, endpoint security, application security, IDS/IPS, deep packet inspection, SIEM, data analytics, security and/or risk management and product development.
  • Deep knowledge of cybersecurity technologies, architectures, and secure design principles.
  • Demonstrated ability to lead teams, manage budgets, and build organizational capability.
  • Excellent communication and stakeholder management skills, with the ability to influence policy and advocate for cybersecurity best practices.
  • Proven experience in cybersecurity management or equivalent leadership role.

QUALIFICATIONS

Primary Function : The Product Owner will serve as the overall leader for the Access Management (AM) and Privileged Access Management (PAM) programs and provide subject matter expertise on a variety of technical and non-technical topics. The Product Owner provides technical guidance and is responsible for contributing to the planning, evaluation, architecture and support of the enterprise AM/PAM solutions and its associated processes. The Product Owner will also be responsible for identifying, evaluating and participating in decision making around new and emerging IAM technologies and should be able to support other areas of IAM/Information Security as needed.

Essential duties to be performed:

  • Work with stakeholders to analyze and document requirements, transforming them into actionable functional and technical specifications. Bridge the gap between business needs and technical feasibility within the AM/PAM programs
  • Leading the technical aspects of AM/PAM programs, providing guidance to team members, and ensuring solutions are aligned with business needs and IAM best practices
  • Build strong AM/PAM programs and serve as the IAM subject matter expert. Key technical contributor to the strategy, design, engineering and management of the enterprise AM/PAM programs
  • Design AM/PAM processes and identify opportunities for improvements. Integrate systems/platforms, in-house applications, third party applications and SaaS applications for authentication, authorization and privileged access management
  • Analyze, design, develop, implement and support AM (MS Entra) and PAM (CyberArk) integrations for various business functions. Establish repeatable processes for both workstreams and identify opportunities for improvements
  • Provide input to Executive Management strategies for the implementation of a modern Identity and Access Management program
  • Work to understand the IT enterprise architecture and collaborate with the architecture team to ensure the AM/PAM security standards are created and adopted into the Enterprise Architecture frameworks
  • Be the primary point of escalation for operational and security issues for AM/PAM platforms and solutions. Lead and support ongoing AM/PAM operations, maintenance and specific problem resolution. Anticipate, identify, track and assist in resolution of technical issues
  • Conduct industry and market research and maintain a working knowledge of emerging trends and technologies in the AM/PAM disciplines. Ensure that the AM/PAM teams are aligning with global standards and initiatives
  • Create and manage a training program to develop the AM/PAM teams. Develop and increase the capability and skills of the current teams. Identify, staff, and manage necessary skills to fill gaps in the teams
  • Manage and direct a consultative team approach for enterprise-wide security initiatives with key stakeholders
  • Produce & review daily, weekly, monthly reports to measure services against key performance & risk indicators
  • Create an environment of trust and confidence amongst the team
  • Bachelor’s degree or equivalent with 12+ years of information security or information technology experience
  • 10+ years’ working experience in Privileged Access Management and Access Management
  • Strong understanding of AM/PAM concepts, technologies, and best practices. Highly effective in developing and communicating audience appropriate information to technical, non-technical, management, and executive audiences
  • Proven experience in successfully designing, implementing and operating AM/PAM service capabilities and overall IAM functions in technically complex organizations
  • Extensive experience in building and implementing AM/PAM platforms with one or more of the leading products - Privileged Access Management (CyberArk). Access Management Products (MS Entra/Okta/Ping). Preferably Microsoft Entra.
  • Strong knowledge of federated identity systems, directory services, role-based access control, multi-factor authentication, and SSO & related standards (e.g. SAML, OAUTH, NTLM, LDAP, Kerberos, PKI, etc.).
  • Experience in developing and running multi-year, complex AM/PAM initiatives and programs
  • Experience managing relationships with Product and Services vendors. Proven ability to build and maintain strong enterprise relationships with internal and external teams/partners
  • Working knowledge of Active Directory concepts, including users, computers, groups, policies. Experience with Linux and Windows Operating Systems
  • Preferred experience with Cloud technologies (Oracle Cloud, Azure or AWS)
  • Understanding of database architecture and concepts
  • Deep knowledge of agile processes and workflows
  • Must have good communication and collaboration skills
  • Solid diagnostic, testing, and problem-solving skills
  • Good organizational and time management skills
  • Must be team-oriented and able to collaborate across many participating teams
  • Preferred position relevant information security certifications (CISSP, CIGE, CIAM, CIMP, CAMS, CIPA)

Experience and Training:

  • Bachelor’s degree or equivalent with 12+ years of information security or information technology experience
  • 10+ years’ working experience in Privileged Access Management and Access Management
  • Strong understanding of AM/PAM concepts, technologies, and best practices. Highly effective in developing and communicating audience appropriate information to technical, non-technical, management, and executive audiences
  • Proven experience in successfully designing, implementing and operating AM/PAM service capabilities and overall IAM functions in technically complex organizations
  • Extensive experience in building and implementing AM/PAM platforms with one or more of the leading products - Privileged Access Management (CyberArk). Access Management Products (MS Entra/Okta/Ping). Preferably Microsoft Entra.
  • Strong knowledge of federated identity systems, directory services, role-based access control, multi-factor authentication, and SSO & related standards (e.g. SAML, OAUTH, NTLM, LDAP, Kerberos, PKI, etc.).
  • Experience in developing and running multi-year, complex AM/PAM initiatives and programs
  • Experience managing relationships with Product and Services vendors. Proven ability to build and maintain strong enterprise relationships with internal and external teams/partners
  • Working knowledge of Active Directory concepts, including users, computers, groups, policies. Experience with Linux and Windows Operating Systems
  • Preferred experience with Cloud technologies (Oracle Cloud, Azure or AWS)
  • Understanding of database architecture and concepts
  • Deep knowledge of agile processes and workflows
  • Must have good communication and collaboration skills
  • Solid diagnostic, testing, and problem-solving skills
  • Good organizational and time management skills
  • Must be team-oriented and able to collaborate across many participating teams
  • Preferred position relevant information security certifications (CISSP, CIGE, CIAM, CIMP, CAMS, CIPA)

Job Systems/Information Technology

Organization Cummins Inc.

Role Category On-site with Flexibility

Job Type Exempt - Experienced

ReqID 2426020

Relocation Package Yes

100% On-Site No

Cummins and E-Verify

At Cummins, we are an equal opportunity and affirmative action employer dedicated to diversity in the workplace. Our policy is to provide equal employment opportunities to all qualified persons without regard to race, gender, color, disability, national origin, age, religion, union affiliation, sexual orientation, veteran status, citizenship, gender identity and/or expression, or other status protected by law. Cummins validates the right to work using E-Verify and will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee’s Form I-9 to confirm work authorization. Visit http://EEOC.gov to know your rights on workplace discrimination.

Company Details
Cummins Inc.
 Columbus, IN, United States
Work at Cummins Inc.

Cummins Inc. is a global power solutions leader that designs, manufactures, distributes, and services a broad portfolio of reliable, clean power... Read more

Did you submit an application for the IAM Product Owner on the Cummins Inc. website?