Matt Hajda

CEO

San Antonio, Texas, United States22 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in Identity and Access Management and cybersecurity strategy.
  • Successfully expanded e-commerce business by 25x in three years.
  • Led security operations for over 60,000 employees at USAA.
Stackforce AI infers this person is a Cybersecurity Architect with strong entrepreneurial and strategic leadership skills.

Contact

Skills

Core Skills

Identity And Access ManagementSecurity ArchitectureEntrepreneurshipBusiness StrategyCybersecurity OperationsIncident ResponsePortfolio ManagementSystems EngineeringSecurity OperationsPenetration TestingSecurity AssessmentInformation Security

Other Skills

Multi-year roadmapsPhishing-resistant MFAPrivileged access managementRegulatory complianceCross-functional collaborationApplication modernizationBusiness developmentE-commerce growthMarket expansionCapital allocationAgile methodologiesSecurity detection roadmapPortfolio architectureSecurity domainsTechnology strategy

About

I’m Matt Hajda - an entrepreneur and cybersecurity expert currently serving as an Enterprise Security Architect at Dell Technologies, focused on Identity and Access Management (IAM) and agentic AI. As cloud adoption, hybrid location work, and mobile access dissolve the traditional network perimeter, identity has become the primary security control. IAM is foundational to ensuring only authorized users, systems, and services can access enterprise resources, reducing the risk of unauthorized access and security incidents. IAM is becoming even more critical as organizations deploy agentic AI systems capable of autonomous planning and execution. In these environments, identity is the central control point for defining what actions AI agents can take, under which conditions, and with what level of oversight. My background spans people leadership and hands-on technical roles, including IT Director, Security Analyst, Penetration Tester, Systems Engineer, and Security Architect. I bring deep experience across IAM, application and data security, infrastructure and endpoint security, SIEM, and cloud platforms (AWS, Azure, GCP). As an entrepreneur, I also bring a business-first lens - understanding how to allocate capital and talent for maximum impact. That perspective directly informs how I evaluate cybersecurity risk, prioritize investments, and shape long-term security strategy.

Experience

Dell technologies

2 roles

Distinguished Engineer

Promoted

Feb 2026Present · 1 mo

Enterprise Security Architect - IAM (Identity and Access Management)

Oct 2021Present · 4 yrs 5 mos

  • Develop and execute multi-year roadmaps for IAM, aligning vision, funding, and resources with business objectives and Zero Trust principles. Lead the design, deployment, and management of IAM solutions, including migrating legacy authentication to phishing-resistant MFA across the enterprise, and built programs to modernize thousands of applications with modern authentication protocols.
  • Drove major updates to privileged access management platforms and standardized secrets management, enhancing user experience and compliance without compromising security. Ensure that IAM practices align with regulatory requirements and internal policies by supporting regular audits and risk assessments.
  • By collaborating closely with senior leaders and cross-functional teams, promote IAM initiatives throughout Dell Technologies and ensure seamless integration across platforms and applications.
Identity and Access ManagementMulti-year roadmapsPhishing-resistant MFAPrivileged access managementRegulatory complianceCross-functional collaboration+1

Medical supplies e-commerce business

Business Owner

Aug 2019Present · 6 yrs 7 mos

  • Acquired an existing e-commerce business specializing in adult medical incontinence products and expanded it 25x over three years. Continued to grow the business, extending into multiple markets. This experience has developed a strong understanding of business capabilities and effective capital allocation for maximum impact. It offers a unique perspective to a cybersecurity career, allowing business acumen to be leveraged when assessing cybersecurity risks and strategic planning for capabilities.
Business developmentE-commerce growthMarket expansionCapital allocationEntrepreneurshipBusiness Strategy

Usaa

6 roles

IT Technical Director - Cyber Threat Operation Center

Promoted

Sep 2018Oct 2021 · 3 yrs 1 mo

  • As an Information Security Director at USAA, led a security operations team responsible for detecting, analyzing, and responding to cybersecurity events, safeguarding over 60,000 employees and 12 million members. The team defined and implemented the security detection roadmap, integrating Identity capabilities with existing security controls. By introducing agile methodologies to prioritize and track work, significantly increased the delivery of new security capabilities.
  • Ensured that Incident Response practices aligned with regulatory requirements and managed teams across infrastructure development, threat intelligence, and analytics. Engaged with key stakeholders to understand business needs and ensured that IAM solutions supported organizational goals.
Cybersecurity operationsIncident responseAgile methodologiesSecurity detection roadmapCybersecurity OperationsIncident Response

Security Architect - Enterprise Security Group

Promoted

Apr 2017Sep 2018 · 1 yr 5 mos

  • Served as the Portfolio Architect for the Enterprise Security Group, overseeing over 275 applications across multiple security domains, including Information Security, Financial Crimes, Physical Security, Business Continuation, and Privacy. Set the overall portfolio technology strategy and collaborated with domain security architects to maximize value and integration points.
Portfolio architectureSecurity domainsTechnology strategyCollaboration with domain architectsSecurity ArchitecturePortfolio Management

Security Architect - Identity and Access Management

Promoted

Feb 2015Apr 2017 · 2 yrs 2 mos

  • Led the design and implementation of IAM technologies, including authentication, authorization, identity provisioning, role-based access controls, and governance for both on-premise and cloud infrastructures. Implemented Identity as a Service (IDaaS) and Privileged Access Management solutions, streamlining IAM processes to enhance compliance and user experience.
IAM technologiesAuthentication and authorizationIdentity provisioningGovernanceIdentity and Access ManagementSecurity Architecture

Lead Computer Systems Engineer

Oct 2013Feb 2015 · 1 yr 4 mos

  • Served as Lead Computer Systems Engineer, leading the IT Operations Secured Processing team, overseeing the lifecycle management of SSL certificates and the administration of API web service integration gateways. Managed team workload and prioritization while spearheading efforts to improve capabilities and technologies.
SSL certificate managementAPI integrationLifecycle managementSystems EngineeringSecurity Operations

Lead Information Security Analyst

May 2009Oct 2013 · 4 yrs 5 mos

  • Managed internal and external penetration testing, designed and maintained USAA's malware analysis lab and architected packet capture capabilities. Conducted all stages of incident response and provided training for a team of 24/7 Security Operations Center (SOC) analysts.
  • Collaborated with key leadership on incident response actions and delivered recurring threat intelligence reports. Presented weekly threat briefings to executive management, focusing on intelligence analysis, the impact of zero-day threats, and ongoing metrics of daily SOC operations.
Penetration testingMalware analysisIncident response trainingPenetration TestingIncident Response

Senior IT Security Analyst

Jan 2004Jul 2007 · 3 yrs 6 mos

  • Implemented and supported technical and administrative security controls, securing large-scale Active Directory infrastructures. Managed intrusion detection systems, remote access administration, and provided technical security support. Assisted with the security vulnerability management process and anti-virus systems. Designed and implemented an enterprise public-key encryption infrastructure and reviewed, evaluated, and recommended IT-related security products.
Active Directory securityIntrusion detectionSecurity controlsInformation SecuritySecurity Operations

Digital defense, inc

Team Lead, On-Site Security Services

Jul 2007May 2009 · 1 yr 10 mos

  • Performed remote and on-site security assessments, including penetration testing of financial networks, vulnerability analysis, web application testing, wireless penetration testing, physical security assessments, and social engineering. As the team lead, responsible for reviewing reports, ensuring performance standards were met, and developing team members.
Security assessmentsVulnerability analysisSocial engineeringSecurity AssessmentPenetration Testing

Education

The University of Texas at San Antonio

Master of Science (MS) — Information Technology - Infrastructure Assurance

Jan 2006Jan 2007

Texas State University

Bachelor of Business Administration (BBA) — Computer Information Systems

Jan 2002Jan 2003

Udacity

AI for Business Leaders — Artificial Intelligence

Jan 2020Jan 2020

Stackforce found 100+ more professionals with Identity And Access Management & Security Architecture

Explore similar profiles based on matching skills and experience