Every situation and set of requirements is different.
Overlap may or may not be intentional in your situation. In whatever situation you have, you should probably have some reporting mechanism after your security roles are built to confirm and review any kinds of overlap. I've seen both lots of overlap and also little or no overlap.