Sr Product Security Engineer

Adobe Adobe · Enterprise · Seattle, WA +1

This role focuses on engineering and operationalizing identity and SaaS security capabilities within an enterprise environment. Key responsibilities include implementing Zero-Trust access controls, hardening privileged access, establishing SaaS security posture monitoring, and instrumenting identity metrics collection. The ideal candidate will have deep experience with enterprise identity controls, Zero Trust principles, and securing SaaS tenants.

What you'd actually do

  1. Engineer Zero‑Trust access controls across workforce and service identities: implement pipelines using RBAC+ABAC standards, device and posture checks, and risk‑adaptive policies for critical services and high-risk scenarios.
  2. Harden privileged access: migrate administrators to right‑size entitlements and eliminate long‑lived elevated access across prioritized platforms (e.g., Entra ID, Privileged Access Management).
  3. Stand up SaaS security posture monitoring: participate in tool POCs and deployments; define baselines for M365/Slack/GitHub/Workday/Google; build remediation runbooks and posture success measurements.
  4. Instrument identity metrics collection and tracking: standardize log schemas for authentication (AuthN)/authorization (AuthZ) and entitlement changes; publish dashboards for privilege drift, misconfigurations, and access sprawl; coordinate risky events to security alert procedures.
  5. Contribute and drive architecture & standards: author implementation guides and reference architecture that supports a multi‑year strategy passionate about measuring risk reduction over time. Inclusive of new technologies and risks.

Skills

Required

  • enterprise identity controls and solutions
  • Entra ID/AD, Okta, and SailPoint
  • Zero Trust principles
  • least privilege and continuous verification models
  • Identity governance and administration (IGA)
  • SaaS posture skills for securing large SaaS tenants (M365, Slack, GitHub, Workday, Google)
  • security Authn and Authz for all identities accessing SaaS tenants
  • Influence & collaboration with key partners
  • Excellent written and verbal communication skills

Nice to have

  • secure access control solutions (e.g. Teleport, Vault)
  • secrets management
  • CI/CD solutions
  • Scripting/automation knowledge (e.g., Python, PowerShell)
  • infrastructure‑as‑code (e.g., Terraform)
  • service identity frameworks (e.g., SPIFFE/SPIRE)
  • workload identity patterns
  • Technical lead experience in enterprise environments

What the JD emphasized

  • identity and SaaS security
  • Zero Trust
  • SaaS security posture monitoring
  • identity metrics collection and tracking
  • identity controls
  • Zero Trust principles
  • SaaS tenants