×
Register Here to Apply for Jobs or Post Jobs. X

VP, IAM Authentication Technologies Leader

Remote / Online - Candidates ideally in
New York, USA
Listing for: Synchrony
Remote/Work from Home position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Job Description & How to Apply Below

Job Description:

Role Summary/Purpose

Synchrony Identity and Access Management (IAM) team is seeking an experienced and visionary IAM leader to head the IAM Authentication Technologies team. This individual will be responsible for guiding a team of IAM authentication technologies engineers in designing, developing, and implementing scalable, secure, and seamless solutions across the enterprise. The role requires a strong blend of technical expertise, leadership, and strategic vision to ensure our IAM ecosystem supports business needs, security requirements, and digital transformation initiatives.

Our

Way of Working

We’re proud to offer you choice and flexibility. At Synchrony, our way of working allows you to have the option to work from home near one of our Hubs or come into one of our offices. Occasionally you may be required to commute to our nearest office for in person engagement activities such as business or team meetings, training and culture events.

Essential

Responsibilities
  • The ideal candidate for this role will embrace the exciting blend of technical expertise, program management, engagement ability and leadership that is required to be successful.

  • Product owner and thought leader that will own the workforce authentication strategy focused on security and user experience. Communicate and get buy-in on strategy to key stakeholder groups.

  • Lead teams focused on Synchrony’s authentications tools and services including Okta, Yubikey, FIDO2, WebAuthN, Passwordless, and RSA Authentication Manager.

  • Advance the SSO, Directory Services, and MFA vision by creating business cases that support, quantify, and prioritize product initiatives that deliver the highest value.

  • Enhance and maintain oversight to Synchrony’s authentication policies, standards, and risk metrics.

  • Maintain technical knowledge of Synchrony’s application authentication and authorization architecture.

  • Understand and implement leading authentication and authorization industry trends, proposing strategies to continually increase Synchrony’s authentication security and user experience.

  • Develop and maintain value driven business relationships through effective needs analysis, program management, customer service and problem resolution.

  • Champion authentication services by advising other business and technology teams on product capabilities.

  • Perform Information Security assessments, in conjunction with Sr. Application Security engineers, for key business applications (e.g. high franchise and high financial risk) to determine that the appropriate technical/process solutions are in place to protect assets.

  • Provide strategic risk guidance for business and technology projects, including the evaluation and recommendation of authentication controls

  • Identification of potential non-compliance issues, drive appropriate risk treatment, and drive remediation

  • Act as subject matter expert on Information Security topics during audit and/or regulatory meetings, business requirements reviews, and architecture reviews

  • Facilitate compliance to defined standards and develop tools to assist compliance

  • Perform other duties and/or special projects as assigned

Qualifications/Requirements
  • Bachelor's degree in Technology, Risk Management, or equivalent work experience

  • Minimum 10 years in Information Technology, Risk Management, and/or Information Security

  • Building, installing, and maintaining security tools and platforms for Information Security

  • Analyzing log data in order to model cybersecurity threats and discover relevant patterns

  • Partnering with broader Information Security and operations groups to build tailored solutions for unique problems

  • Automating team and business processes where possible (through RPA or Python scripts)

  • Evaluating existing team processes and technologies and applying Dev Ops principles where possible

  • Collaborating with technology teams to implement FW rules and Proxy requests for application functionality

  • Implementing new technologies by building out new Virtual Machines, installing dependencies, application software, etc.

  • Proactively monitoring platform health and stability

  • Operating in a Linux or Windows command-line environment to maintain…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary