Product Manager - Connectivity Assessment Solution

Ziff Davis
3 weeks ago
Create job alert

Description

Position at Ookla

Ookla is a global leader in connectivity intelligence, offering unparalleled network insights through the combined expertise of Speedtest, Downdetector, RootMetrics, and Ekahau. Ookla’s complementary datasets combine crowdsourced and controlled, public and private collection methods, QoS and QoE metrics, and more to unlock correlations and actionable insights — helping organizations optimize networks, enhance digital experiences, and create better connected experiences for end-users.

Our team is a group of people brought together through passion and inspired by possibility. We are looking for team members who love solving problems, are motivated by challenges, and enjoy turning clever ideas into exceptional products. When you work for us, you are using Ookla data and insights to advance our mission of better connectivity for all.

ROLE SUMMARY

We are seeking an experienced results-driven Product Manager to lead the definition, development, market launch and lifecycle management of a new solution. This exciting opportunity for the right candidate to put their stamp on a new business expansion initiative which leverages Ookla’s technology and global breadth.

The Senior Product Manager will be responsible for leading the strategy, development, and launch of a data-driven certification program.You will manage cross-functional teams and collaborate with partners, ISPs, security firms, and enterprise customers to ensure our methodology incorporates the best of Ookla Cell Analytics, Ekahau, RootMetrics, Wind, and security assessments.

Key Responsibilities:

●Product Strategy and Roadmap:

○Define the vision, roadmap, and KPIs for Ookla Verify.

○Design and iterate the scoring methodology, integrating Wi-Fi, cellular, ISP, and security factors.

○Develop a data-driven scoring rubric using insights from Ookla Cell Analytics, RootMetrics, Wind, and security assessments.

○Lead security framework integration into certification criteria, ensuring compliance with industry standards (NIST, ISO 27001, SOC 2, GDPR, HIPAA, .

●Market and Competitive Analysis:

○Constantly analyze competitive landscape in primary and adjacent markets, identify competitory movements, risks, and provide portfolio recommendations.

○Monitor industry trends in enterprise connectivity, security, and smart buildings.

○Work with ISPs, property owners, channel partners, and complementary technology partners to refine value propositions.

●Partner and Industry Engagement.

○Develop an accreditation program and strategic partnerships with consultants, ISPs, security vendors, and other complementary technology partners.

○Ensure certification aligns with the business requirements of property and real estate firms, and enterprise IT teams.

○Work alongside sales and marketing to increase adoption of both verification services and licensed branding rights.

●Go-to-Market & Launch:

○Develop and execute go-to-market strategies for new services, including pricing models, promotional tactics, and sales enablement.

○Work with marketing and sales teams to drive adoption, ensure proper training, and communicate service value to customers.

○Monitor service performance post-launch and adjust marketing and delivery tactics as needed.

●Metrics & Performance Management:

○Define and track key metrics to assess service performance (., customer satisfaction, service adoption, and financial success).

○Report on service performance regularly to leadership, highlighting successes, challenges, and opportunities for improvement.

●Collaboration & Communication:

○Work closely with internal teams (sales, operations, engineering, to ensure service offerings are delivered successfully.

○Act as a liaison between business stakeholders and the development team to ensure alignment on priorities and timelines.

○Communicate updates, new releases, and improvements to internal and external stakeholders.

●Technical Implementation & Collaboration

○Collaborate with Ookla's data science and engineering teams to develop automated network assessment tools.

○Establish APIs and integrations for partners to incorporate certification into their network monitoring platforms

○Ensure security assessment tools comply with industry-standard cybersecurity frameworks

Qualifications & Skills:

●Education:

○Bachelor's Degree in a relevant technical or business field, such as Network Engineering. Cybersecurity, Telecommunications, Data Science, Electrical Engineering, Information Systems, Business (with a strong technical background).

○A Master’s degree (MBA, MS in Cybersecurity, or MS in Data Science/Networking) is preferred.

○Equivalent work experience will be considered.

●Desired Experience:

○10+ years of product management experience in at least one of the following areas:

○Telecommunications & Network Analytics (., working with mobile carriers, ISPs, enterprise IT)

○Cybersecurity & Compliance (., industry-specific security frameworks, enterprise security software, risk management)

○Telecommunications & Wireless Networking

○Worked for or with mobile operators, ISPs, or network infrastructure vendors

○Familiarity with 5G, CBRS, fiber broadband, Wi-Fi 6E/7

○Cybersecurity in an Enterprise IT Setting

○Previous work in cybersecurity threat intelligence, security audits, or compliance teams

○Hands-on experience with firewalls, IDS/IPS, Zero Trust architectures

○Startup & Business Model

○Experience developing certification-based or licensing business models

○Familiarity with commercializing data insights & network benchmarking services

Proven Skills and Experience

○Launching and scaling data-driven B2B products

○Working with network performance measurement tools (., Speedtest, Ekahau, RootMetrics)

○Security assessments and compliance (., NIST, ISO 27001, SOC 2, Zero Trust)

○Managing cross-functional teams (., engineering, data science, sales, marketing)

○Building API-based products & integrations in the telecom/security space

○Business acumen, financial analysis, P&L management

○Experience working with multisided business models, and ecosystems.

Preferred Skills:

●Experience in telecom or IT industry required

●Strong understanding of customer success and experience management.

●Experience in a fast paced environment to drive new business

Related Jobs

View all jobs

Product Manager - Connectivity Assessment Solution

Product Marketing Manager

Product Line Manager

Manager, Product Design

Lead Product Manager

Senior Account Manager - Defence

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Global vs. Local: Comparing the UK Cybersecurity Job Market to International Landscapes

Understanding opportunities, salaries, and work culture in cybersecurity across the UK, the US, Europe, and Asia Cybersecurity has rapidly ascended from a back-office concern to a strategic priority for every industry. As data breaches, ransomware, and nation-state attacks increase in frequency and sophistication, organisations worldwide are racing to fortify their digital defences. This ongoing surge in cyber threats fuels an unprecedented demand for skilled security professionals—ranging from penetration testers and threat intelligence analysts to cloud security architects and CISOs. In this article, we’ll explore how the UK cybersecurity job market compares to major international hubs in the United States, Europe, and Asia. We’ll discuss job opportunities, salary bands, work culture, and provide guidance for those who might be contemplating remote or overseas positions. By understanding the nuances of each region’s cybersecurity ecosystem, you can make a more informed decision about where and how to advance your career in this high-impact, fast-evolving sector. Whether you’re a seasoned expert with years of experience or a career-changer eager to break into cybersecurity, this overview will help you navigate the global landscape. By the end, you’ll have a clearer perspective on each region’s advantages and challenges—along with practical insights for seizing the best opportunities in a field that has become mission-critical for every modern organisation.

Cybersecurity Leadership for Managers: Strategies to Motivate, Mentor, and Set Realistic Goals in Threat-Driven Environments

In an era of rapidly increasing data breaches, ransomware attacks, and corporate espionage, the importance of robust cybersecurity cannot be overstated. Protecting digital assets has become as essential as safeguarding physical resources, and organisations worldwide rely heavily on specialised teams to defend against sophisticated cyber threats. However, even the most advanced tools and techniques are only as effective as the leadership guiding their use. Cybersecurity leadership requires a dynamic blend of technical know-how, strategic thinking, and people-management skills to maintain readiness against ever-evolving threats. This article is designed for professionals aiming to lead cybersecurity teams or transition into managerial roles where understanding how to motivate, mentor, and set realistic goals is paramount. With insights into building high-performing teams, fostering collaboration, and embracing continuous learning, you’ll be equipped to protect your organisation from a broad spectrum of cyber risks.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.