Test Analyst
Job title: Test Analyst - Identity and Access
Duration: Initial 3-6 Months
Location: London (hybrid)
Overview
The Test Analyst will support the delivery of high-quality Identity & Access Management solutions by designing, executing, and evidencing tests across multiple IAM workstreams, including Privileged Access and Remote Access. The role focuses on validating access rules, integrations, and user journeys, while supporting UAT and working alongside third-party delivery teams.
Key Responsibilities
- Design and execute test cases and scenarios covering remote access,access provisioning, authentication, and privilege controls.
- Support UAT preparation and execution, including test data setup, scenario walkthroughs, and defect support.
- Work closely with third-party suppliers to review test evidence, reproduce defects, and confirm fixes.
- Log, track, and retest defects, ensuring clear traceability and quality evidence.
- Contribute to test documentation, test reports, and audit-ready evidence packs.
- Identify gaps, risks, or inconsistencies in access behaviour and escalate appropriately.
Essential Skills and Experience
- Experience as a Test Analyst within IAM, security, or enterprise systems programmes.
- Understanding of IAM principles, including logical access, and privileged access.
- Experience with running UAT support, defect management, and collaboration with business users.
- Strong attention to detail with a structured, evidence-driven testing approach.
- Ability to work across multiple workstreams and priorities in a fast-paced delivery environment.
- Clear communication skills, able to work with technical teams, vendors, and non-technical stakeholders.
Desirable Skills
- Working knowledge of logical access management principles, including authentication, authorisation, and secure access pathways
- Understanding of network access concepts relevant to identity, such as corporate networks, remote access models, VPNs, and zero-trust approaches.
- Experience or familiarity with Multi-Factor Authentication (MFA) methods, including app-based, hardware-based, and risk-based authentication
- Knowledge of Virtual Desktop Infrastructure (VDI) and secure remote working solutions, including how identity and access controls are enforced in virtual environments.
- Awareness of Privileged Access Workstations (PAW) / Virtual PAW concepts and their role in protecting high-risk or administrative access.
- Familiarity with hardware authentication devices such as security keys (e.g. U2F/FIDO2 keys, YubiKeys) and their integration into access flows.