What are the responsibilities and job description for the Technical Program Manager with IAM and Zscaler position at Adbakx?
Title: Technical Program Manager with IAM and Zscaler
Location: Boston, MA(Dayone Onsite role)
Duration: Long term
Hourly billing rate: Contract
Number of Position: 1
.
Required Skills & Qualifications
We are seeking a highly skilled Technical Program Manager (TPM) with strong expertise in Identity and Access Management (IAM) and Zscaler technologies.
The TPM will lead cross-functional programs focused on securing enterprise environments, driving IAM initiatives, and implementing Zscaler solutions to enhance network security and zero-trust architecture.
∙ 14 years in technical Program management with Cybersecurity leadership roles.
∙ Hands-on experience with IAM platforms such as Okta, Azure AD and Ping Identity; SSO, MFA, directory services, PAM and IGA.
∙ Proven expertise in Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA).
∙ Strong understanding of zero-trust principles, identity federation and cloud security.
∙ Familiarity with networking concepts including VPN, proxy and firewalls.
∙ Excellent communication, stakeholder management and problem-solving abilities.
∙ Ability to manage multiple priorities in a fast-paced environment.
∙ Certifications such as CISM, CISSP, PMP, Zscaler Certified Professional or equivalent.
∙ Experience with cloud platforms (AWS, Azure, GCP) and DevSecOps practices.
.
Key Responsibilities
Program Management
∙ Drive end-to-end delivery of IAM and Zscaler-related programs, ensuring alignment with business objectives.
∙ Develop and maintain program roadmaps, timelines, and resource plans.
∙ Manage stakeholder communication, status reporting, and risk mitigation.
.
Technical Leadership
∙ Collaborate with security architects, engineers, and product teams to design and implement IAM solutions such as SSO, MFA and RBAC.
∙ Oversee Zscaler deployment and integration with enterprise systems.
∙ Ensure compliance with security standards and regulatory requirements.
.
Process Governance
∙ Define and enforce governance frameworks for identity lifecycle management.
∙ Establish KPIs and metrics to measure program success and security posture.
.
Cross-Functional Collaboration
∙ Partner with IT, Security, and Business units to align technical solutions with organizational goals.
∙ Facilitate workshops and training sessions for stakeholders.
.
Education
∙ Bachelor’s degree in computer science, information security, or a related field.