Job Description
Job Description
Warwick/Wokingham
Immediate joiners only
Mandatory Skills: SailPoint Identity Mgmt. and Governance.
General Responsibilities: Develop detailed test scripts aligned with business and technical specifications Maintain traceability between test cases and source requirements to ensure auditability and complete test coverage Execute hands-on testing activities across System Testing (ST), System Integration Testing (SIT), and support User Acceptance Testing (UAT)Use ADO Board (or similar tool) to log test progress, raise and manage defects, and report daily status to the Test Lead Work closely with business users during UAT to validate scenarios and document test evidence Contribute to key testing documentation, including execution summaries and the final Test Closure Report Provide structured support to Project Managers and Test Leads throughout the testing life cycle In addition to the above responsibilities, the IdAM Test Analyst must have proven experience testing Identity and Access Management (IdAM) systems. This includes the ability to validate: User Authentication: Login/logout flows, password policies, MFA, and account lockout User Authorisation: Correct access levels and permissions based on defined roles Privileged Access Management (PAM): Enforcing access controls and preventing unauthorised access Role Management: Creating, editing, and deleting user roles and their associated permissions Policy Enforcement: Testing correct application of access policies under varied conditions Experience with IdAM tools is required, including (but not limited to):Microsoft Entra Cyber Ark SailPoint Service Now Saviynt
͏
Ensuring customer centricity by providing apt cybersecurity
Monitoring and safeguarding the log sources and security access
Planning for disaster recovery in the event of any security breaches
Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
Conduct security assessments, risk analysis and root cause analysis of security incidents
Handling incidents escalated by the L1 team in 24x7 rotational shifts
Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
Completing all tactical security operations tasks associated with this engagement.
Analyses all the attacks and come up with remedial attack analysis
Conduct detailed analysis of incidents and create reports and dashboards
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issues and provide future recommendations
Maintain an information security risk register and assist with internal and external audits relating to information security
Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
Advice and guidance to employees on issues such as spam and unwanted or malicious emails
͏
i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives
ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture
iii. Depending on the client ’s need with particular standards and technology stacks create complete RFPs
iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology
v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions
vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps
vii. Evaluate and recommend solutions to integrate with overall technology ecosystem
viii. Tracks industry and application trends and relates these to planning current and future IT needs