Senior Product Manager, Security & Infra

Weights & Biases Weights & Biases · Data AI · Bellevue, WA +4 · Information Technology

Product Manager, Security & Identity for CoreWeave's workforce security and identity platforms across IT Infrastructure and Operations. Focus on identity and access management, secure collaboration, endpoint/VDI, and SaaS governance. Partner with IT Engineering, Security, People, and Compliance to ensure secure access, streamline onboarding/offboarding, and enhance employee experience.

What you'd actually do

  1. Own the roadmap and delivery of CoreWeave’s workforce security and identity platforms across IT Infrastructure and Operations.
  2. Focus on identity and access management, secure collaboration, endpoint/VDI, and SaaS governance.
  3. Partner closely with IT Engineering, Security, People, and Compliance to make access secure by default, reduce friction in onboarding and offboarding, and improve the overall employee experience.
  4. Translate requirements from Security, Compliance, IT, and business stakeholders into clear product outcomes across platforms such as Okta, Opal, VDI, MDM, Google Workspace, Slack, Zoom, and other SaaS applications.
  5. Help convert the existing Staff IT Systems Engineer responsibilities into scalable, measurable product capabilities that align with the IT Infra and Ops charter.

Skills

Required

  • 7+ years of experience in IT product management, technical program management, or systems engineering roles focused on SaaS, identity, security, or endpoint platforms.
  • Practical experience with administration or close partnership on platforms such as Okta (Identity Engine and Identity Governance), Google Workspace, Slack, Zoom, MDM or endpoint management tools, and VDI solutions.
  • Strong understanding of identity and access management concepts and practices, including SSO, federation, RBAC, joiner and leaver lifecycle, privileged access, and quarterly access reviews.
  • Experience collaborating with or supporting Microsoft, Linux, and Mac user environments, especially for secure access, device management, and productivity tooling.
  • Demonstrated experience defining and driving automation workflows and integrations that remove manual IT and security tasks, such as access provisioning, group management, and device or SaaS lifecycle actions.
  • Familiarity with CI or CD tools and Git, and the ability to work closely with engineers on configuration, releases, and environment management.
  • Comfort working with at least one programming or scripting language, such as Python or Go, at a level sufficient to understand implementation options and tradeoffs.
  • Experience partnering with Security and Compliance on access controls, ITGCs, and IT application controls for frameworks such as SOX or SOC 2, including control design and evidence collection.
  • Strong written and verbal communication skills, with the ability to translate technical and security concepts into clear product narratives and decisions for both technical and non-technical audiences.

Nice to have

  • Experience in high-growth, cloud-native, or security-sensitive environments where identity, access, and endpoint posture are tightly linked to customer and compliance expectations.
  • Prior ownership of IAM or security products such as Okta, Opal, CyberArk, VDI, or device management platforms as a product manager or TPM.
  • Familiarity with automation and infrastructure-as-code tooling such as Terraform, Ansible, Chef, Intune, Jamf, or similar technologies.

What the JD emphasized

  • identity and access management
  • secure collaboration
  • endpoint/VDI
  • SaaS governance
  • identity and access management
  • secure remote access
  • joiner, mover, and leaver flows
  • SSO integrations
  • access policies
  • RBAC
  • Just-in-Time and time-bound access
  • VDI and secure remote access
  • SLIs, SLOs
  • automated onboarding and offboarding
  • privileged access
  • asset and SaaS lifecycle management
  • inventory visibility
  • licensing utilization
  • access governance
  • IAM, VDI, and related security and IT processes
  • ITGCs
  • IT application controls
  • SOX or SOC 2