IAM Technical Product Manager

Company:  AIG
Location: Clayton
Closing Date: 08/11/2024
Salary: £125 - £150 Per Annum
Hours: Full Time
Type: Permanent
Job Requirements / Description

At AIG, we are reimagining the way we help customers to manage risk. Join us as an IAM Technical Product Manager to play your part in that transformation. It’s an opportunity to grow your skills and experience as a valued member of the team.


Make your mark in Information Technology


At AIG, technology is at the heart of everything we do, from underwriting risks to processing claims. The Information Technology team equips our colleagues with the latest tools to complete their work efficiently and with the highest standards of excellence. The team is responsible for shielding the company’s systems from security risks, while designing technology strategies that enable AIG’s businesses to achieve their goals. AIG’s Information Technology functions include enterprise architecture, software and systems engineering, cybersecurity, and technology risk and compliance.


How you will create an impact

The IAM Technical Product Manager fulfills a critical role in the design, implementation, and governance of our Identity and Access Management (IAM) systems and will focus on Privileged Access Management. This role will align business requirements with IAM solutions and ensure seamless integration and robust security controls. In addition, this role will have a deep understanding of IAM principles, extensive experience with IAM technologies, and translate technical details into business language.


Key responsibilities include:
  1. Engage with Security, IT, and Business stakeholders to understand their identity related needs and translate those needs into detailed technical requirements.
  2. Conduct comprehensive analysis of existing IAM processes and identify areas for improvement.
  3. Partner with IAM engineering to design and implement solutions that meet business requirements and comply with security standards.
  4. Provide expert guidance on IAM technologies to drive effective identity lifecycle management, privileged access management, and advanced authentication solutions.
  5. Develop and maintain detailed documentation of IAM architectures, processes, and policies.
  6. Advocate for user-centric approach in IAM solutions, ensuring ease of use and positive user experience.
  7. Provide support and troubleshooting for IAM related issues, acting as a liaison between business users and technical teams.
  8. Lead training sessions and create end user guides to educate end users on IAM processes and tools.
  9. Lead IAM projects from conception through deployment, ensuring timely and successful delivery of IAM initiatives utilizing agile methodologies.
  10. Mentor and provide guidance to non-senior analysts and team members to help foster a collaborative and knowledgeable team environment.
  11. Strong knowledge of security standards and protocols (e.g., LDAP, SAML, OAuth).

Identity Governance and Administration:
  1. Main point of contact for business and application owners for onboarding applications into AIG’s identity governance tool (ex: SailPoint).
  2. Partner with teams across IAM, Human Resources, Procurement, and Business Leads to analyze and enhance Joiner, Mover, Leaver, LOA, Rehire, and other access related processes.
  3. Review and approve final design of developed roles for business teams and department.
  4. Assist in developing and completing access certification campaigns.
  5. Develop business friendly descriptions for application access entitlements.

Advanced Authentication:
  1. Engage with application (workforce and customer) owners to understand their application’s purpose and authentication model to enable the onboarding of the application to Okta solutions.
  2. Provide guidance and recommendations to related best practices to ensure the appropriate degree of authentication assurance levels are reached based on application risk score.

Privileged Access Management:
  1. Engage with account and application owners to understand their account’s purpose and usages so that the account can be securely onboarded to CyberArk with automation password rotation and secure sessions, where applicable.
  2. Identify system configuration and design and ensure that deployment matches requirements.

What you'll need to succeed

  1. Bachelor’s degree in cybersecurity, information technology, or related field, such as computer science.
  2. 7+ years of experience in IAM or related field.
  3. Experience with application onboarding to IAM services (IGA / CIAM / Workforce / PAM) preferably as a Technical Business Analyst with large scale enterprise onboarding.
  4. Strong understanding of IAM concepts, frameworks, and technologies.
  5. Vast experience with IAM tools such as Okta (workforce and customer), Ping Identity, SailPoint, CyberArk, etc.
  6. In-depth knowledge of security protocols, principals, and best practices.
  7. Team player with excellent problem-solving skills and attention to detail, with an ache to learn and continuously improve.
  8. Strong project management skills with experience leading IAM project leveraging agile methodology and leading scrum sessions.
  9. Relevant security certifications (e.g., CISSP, CISM, CISA) or other IAM specific certifications (i.e., CyberArk Sentry, etc.) are a plus.
  10. Excellent communication (written and verbal) and interpersonal skills, including ability to translate technical concepts with non-technical business leaders.
  11. Exceptional analytical and decision-making skills.

Experience / familiarity with:
  1. Advanced authentication and authorizations standards.
  2. Joiner, mover, leaver processes and optimization patterns.
  3. Role mining techniques to analyze users and entitlements to efficiently design access bundles with least privilege.
  4. Single Sign On (i.e., Kerberos, SAML, OIDC/OAuth, etc.) technologies and protocols.
  5. Multi-factor authentication technologies, including modern approaches such as passkeys.
  6. Concept of authoritative identity source (e.g. Workday) with ability to define automated birthright access through a combination of RBAC, ABAC, and PBAC based on meaningful identity attributes.
  7. Privileged access management concepts, such as password rotation, secure session management, time-to-live, least privilege, etc.

Ready to step up to new challenges? We would love to hear from you.


For positions based in Jersey City, NJ the base salary range is $99,000-$143,000 and the position is eligible for a bonus in accordance with the terms of the applicable incentive plan. In addition, we’re proud to offer a range of competitive benefits, a summary of which can be viewed here: New_Hire_Benefits_Overview_202.pdf (sprinklr.com).


AIG provides equal opportunity to all qualified individuals regardless of race, color, religion, age, gender, gender expression, national origin, veteran status, disability or any other legally protected categories. AIG is committed to working with and providing reasonable accommodations to job applicants and employees with disabilities. If you believe you need a reasonable accommodation, please send an email to


Functional Area:

IT - Information Technology


AIG Employee Services, Inc.

#J-18808-Ljbffr
Apply Now
An error has occurred. This application may no longer respond until reloaded. Reload 🗙