VP, Authentication Governance Senior Manager
Listed on 2026-01-10
-
IT/Tech
IT Project Manager, Cybersecurity
VP, Authentication Governance Senior Manager Who We Are
At Corebridge Financial, we believe action is everything. That’s why every day we partner with financial professionals and institutions to make it possible for more people to take action in their financial lives, for today and tomorrow. We align to a set of values that are the core pillars that define our culture and help bring our brand purpose to life.
- We are stronger as one:
We collaborate across the enterprise, scale what works and act decisively for our customers and partners. - We deliver on commitments:
We are accountable, empower each other and go above and beyond for our stakeholders. - We learn, improve and innovate:
We get better each day by challenging the status quo and equipping ourselves for the future. - We are inclusive:
We embrace different perspectives, enabling our colleagues to make an impact and bring their whole selves to work.
The Information Technology organization is the technological foundation of our business and works in collaboration with our partners from across the company. The team drives technology and digital transformation, partners with business leaders to design and execute new strategies through IT and operations services, and ensures the necessary IT risk management and security measures are in place and aligned with enterprise architecture standards and principles.
AboutThe Role
The VP, Authentication Governance Senior Manager will provide overall leadership and oversee the company’s workforce authentication service function. This role reports to the Global Head of Authentication (Identity and Access Management) and requires extensive background and overall experience in IAM strategy, architecture, and software development/engineering, as well as subject matter expertise in authentication services (both internal workforce and customer). The role will ensure appropriate visibility, communication, and governance across key business partners and stakeholders.
It will involve working across organizational boundaries, managing engineering and operations teams, overseeing vendors, driving POCs and negotiations, and interfacing with audit and regulatory teams.
- Plan and execute the delivery of Authentication services (Customer IAM).
- Lead & oversee the design and development of Authentication solutions that enforce applicable organization security policies and access management requirements.
- Lead and oversee the build, configuration, and architecture of one or more authentication platforms, such as Okta/Ping and Azure including integral technology components such as SSO (Single sign-on), registration, identity proofing, multifactor authentication, password resets, etc.
- Demonstrate an understanding of Authentication services and integration with broader security solutions, such as Identity & Access Governance, Privileged Access and broader Cybersecurity services.
- Defines, enhances, and oversees all enterprise-wide authentication processes, controls and follow-up, exception & risk acceptance approvals, and walkthroughs.
- Oversees the development of technical authentication solutions, engaging service owners, architects, project managers, global infrastructure teams, regional IT teams and key IAM product vendors during the lifecycle of solutions delivery.
- Responsible for business requirements to integrate authentication systems with in-house and third-party applications for provisioning, access requests, and certifications.
- Represents the IAM organization on large scale technology projects implemented outside IAM, regulatory reviews and internal and external audits.
- Ability to confidently articulate business risks and technical challenges to stakeholders.
- Be action oriented:
Taking on new opportunities and tough challenges with a sense of urgency, high-energy and enthusiasm. - Balance stakeholders:
Anticipating and balancing the needs of multiple stakeholders. - Collaborate:
Building partnerships and working collaboratively within and outside ISO (Information Security Office) organization to meet shared objectives. - Communicate effectively:
Developing and delivering multi-mode communications that…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).