Airbnb was born in 2007 when two hosts welcomed three guests to their San Francisco home, and has since grown to over 5 million hosts who have welcomed over 2 billion guest arrivals in almost every country across the globe. Every day, hosts offer unique stays and experiences that make it possible for guests to connect with communities in a more authentic way. The Community You Will Join: Airbnb is a mission-driven company dedicated to helping create a world where anyone can belong anywhere. It takes a unified team committed to our core values to achieve this goal. Airbnb's various functions embody the company's innovative spirit and our fast-moving team is committed to leading as a 21st century company. The strategic goal of the Risk and Compliance Operations team is to focus on creating the standardized operational security processes and protocols in order to ensure there is proper Risk Governance and Compliance for Community Support teams in specific domains, including product, process, and engineering in accordance with company policies and contractual agreements. The Difference You Will Make: As a key member of our team, you’ll drive operational excellence, foster innovation, and champion security and productivity. You’ll play a pivotal role in designing and maintaining provisioning frameworks, collaborating with engineering partners to optimize permission models and tooling, and balancing speed with robust security across all processes. Your expertise will be essential in leading cross-functional Customer Support initiatives, securing alignment, and building strategic partnerships with teams like InfoSec, Partner Management, Legal, and Privacy to advance our mission. Through your work with stakeholders, you will: Develop and execute improvement roadmaps. Manage projects for implementing new security and privacy controls. Lead process enhancements and optimize access controls. Define audit and reporting mechanisms for both internal and vendor teams. Deliver best-in-class privacy and data protection for Operations. You’ll be joining a newly formed team with the rare opportunity to shape its culture and direction—bringing vision, leadership, and an entrepreneurial spirit as our team grows. A Typical Day: Governance & Reporting: Measure, report, and govern privileged access controls to ensure compliance. Requirements & Implementation: Document and translate PAM (Privileged Access Management) requirements for technology partners, supporting efficient, modern, and sustainable solutions. Stakeholder Collaboration: Work cross-functionally to develop and iterate on PAM requirements across Process, Data, and Technology domains. Policy & Standards: Partner with the policy governance team to socialize and publish updates to the PAM Standard. Authentication & Security: Apply your mastery of authentication platforms (Active Directory, LDAP, Kerberos, Radius) and PAM principles (JIT provisioning) to make recommendations to policy and provisioning processes and technology teams. Regulatory Compliance: Ensure alignment with industry regulations and standards (NIST, ISO/IEC, FFIEC), particularly within financial services. Risk Management: Proactively identify, assess, and mitigate PAM risks, driving continuous improvement and accountability. Stakeholder Engagement: Report on existing and emerging PAM/information security risks to senior leadership with transparency and clarity. Quality Assurance: Design and execute thorough test strategies for privileged access processes, collaborate on defect resolution, and recommend improvements for usability, resilience, and security. Documentation: Maintain clear, comprehensive records of policies, approval processes, and test outcomes. Industry Engagement: Stay up-to-date with emerging trends and best practices in privileged access management. Access Management policies: Define and maintain access management policies for different user personas (admin, developer, user, viewer). Leadership: Coach and train team members, ensuring accurate and efficient Human in the Loop processes. Access lifecycle: Oversee the full lifecycle of access (create, edit, delete, view, hide, etc.). Build and refine abstractions to inform access decisions, considering: User roles/personas Tenant or organizational affiliation Privileges assigned via specific permissions or group memberships
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed