Jacqueline Flowers currently serves as the Manager of Identity, Security, and Access Management at T-Mobile, where she plays a pivotal role in shaping the company's approach to identity governance and cybersecurity. With a robust background in managing engineering teams, Jacqueline has successfully transitioned from overseeing...
Jacqueline Flowers currently serves as the Manager of Identity, Security, and Access Management at T-Mobile, where she plays a pivotal role in shaping the company's approach to identity governance and cybersecurity. With a robust background in managing engineering teams, Jacqueline has successfully transitioned from overseeing the Identity Management Authentication team—focused on platforms like Okta and Entra ID—to leading the Identity Governance and Administration team. This shift has allowed her to enhance provisioning processes for T-Mobile employees and partners, utilizing advanced tools such as SailPoint and Entra ID to ensure seamless access management.
In her current role, Jacqueline emphasizes the importance of collaboration across cybersecurity teams, fostering a culture of shared responsibility for access integrity throughout the organization. Her expertise in agile methodologies and process improvement has been instrumental in streamlining operations, aligning them with T-Mobile's strategic goals. By leveraging her skills in software project management, strategic planning, and business process optimization, she has driven significant advancements in identity management practices.
Jacqueline’s commitment to supplier management and integration has also played a crucial role in enhancing T-Mobile's security posture. She actively engages in training initiatives to elevate team capabilities and ensure that best practices are consistently applied across projects. As a leader in the Identity Management and Security domain, Jacqueline Flowers not only safeguards T-Mobile's digital assets but also champions innovative solutions that empower the organization to navigate the complexities of modern cybersecurity challenges effectively.