Posted today
Unspecified
Mid Level Career (5+ yrs experience)
Unspecified
No Traveling
IT - QA and Test
QA Tester
(IAM, API, Functional Testing)
ForgeRock exp preferred
Location: REMOTE
Pay Rate: Open to W2 options
Position Type: Multiyear Contract
Requirements
• Experienced Quality Assurance (QA) Tester with a strong background in Identity & Access Management (IAM) environments to join our team
• The ideal candidate will have deep experience in functional testing and API testing, familiarity (or willingness to learn) IAM components and workflows, and some automation experience — ideally using Azure DevOps (ADO), with experience on IAM platforms like ForgeRock a plus (but not required)
• You will play a critical role in ensuring that IAM systems — responsible for authentication, authorization, user provisioning, and access control — are robust, secure, and functionally correct
• Design & execute test plans — Define comprehensive test strategies, test cases, and test scenarios covering functional requirements, IAM workflows, APIs/endpoints, and integration points. This includes unit, integration, end-to-end, regression, and user-acceptance testing (UAT) cycles.
• IAM component testing — Validate IAM-specific functionality such as authentication (SSO, single sign-on; MFA, multi-factor authentication), authorization, role-based access control (RBAC), user provisioning/de-provisioning, joiner/mover/leaver processes, identity federation (SAML, OAuth/OIDC, SCIM), access reviews, and audit logging.
• API testing and validation — Test backend services, REST or SOAP APIs, verify correct behavior of identity-management APIs, token handling, session management, and integration with identity providers or other systems.
• Automation of test cases — Build, maintain, and execute automated test suites (for APIs or UI/web if applicable), especially around IAM workflows, access controls, login/auth, provisioning, and other critical IAM paths. Ideally integrate automated tests into a CI/CD pipeline using ADO or similar DevOps tooling.
• Defect tracking and reporting — Log, track, and manage defects (functional or security-related), work with developers/architects to reproduce issues, and verify fixes. Provide detailed documentation and test result reports to stakeholders.
• Collaboration & cross-team coordination — Work closely with IAM architects, security team, developers, DevOps, and business stakeholders to understand requirements, identity flows, and ensure quality across identity, access, and security components.
• Security- & compliance-aware testing — Given the sensitive nature of identity management, include negative/edge-case testing (e.g. invalid credentials/access attempts), verify role-based restrictions, test for potential privilege escalation, injection/authorization vulnerabilities, and ensure system behavior is secure and compliant.
• Maintain test environments & test identities — Manage IAM test environments, provisioning/de-provisioning of test users, maintain identity data for testing, ensure test environments mimic production as closely as possible (roles, permissions, auth flows, federation).
(IAM, API, Functional Testing)
ForgeRock exp preferred
Location: REMOTE
Pay Rate: Open to W2 options
Position Type: Multiyear Contract
Requirements
• Experienced Quality Assurance (QA) Tester with a strong background in Identity & Access Management (IAM) environments to join our team
• The ideal candidate will have deep experience in functional testing and API testing, familiarity (or willingness to learn) IAM components and workflows, and some automation experience — ideally using Azure DevOps (ADO), with experience on IAM platforms like ForgeRock a plus (but not required)
• You will play a critical role in ensuring that IAM systems — responsible for authentication, authorization, user provisioning, and access control — are robust, secure, and functionally correct
• Design & execute test plans — Define comprehensive test strategies, test cases, and test scenarios covering functional requirements, IAM workflows, APIs/endpoints, and integration points. This includes unit, integration, end-to-end, regression, and user-acceptance testing (UAT) cycles.
• IAM component testing — Validate IAM-specific functionality such as authentication (SSO, single sign-on; MFA, multi-factor authentication), authorization, role-based access control (RBAC), user provisioning/de-provisioning, joiner/mover/leaver processes, identity federation (SAML, OAuth/OIDC, SCIM), access reviews, and audit logging.
• API testing and validation — Test backend services, REST or SOAP APIs, verify correct behavior of identity-management APIs, token handling, session management, and integration with identity providers or other systems.
• Automation of test cases — Build, maintain, and execute automated test suites (for APIs or UI/web if applicable), especially around IAM workflows, access controls, login/auth, provisioning, and other critical IAM paths. Ideally integrate automated tests into a CI/CD pipeline using ADO or similar DevOps tooling.
• Defect tracking and reporting — Log, track, and manage defects (functional or security-related), work with developers/architects to reproduce issues, and verify fixes. Provide detailed documentation and test result reports to stakeholders.
• Collaboration & cross-team coordination — Work closely with IAM architects, security team, developers, DevOps, and business stakeholders to understand requirements, identity flows, and ensure quality across identity, access, and security components.
• Security- & compliance-aware testing — Given the sensitive nature of identity management, include negative/edge-case testing (e.g. invalid credentials/access attempts), verify role-based restrictions, test for potential privilege escalation, injection/authorization vulnerabilities, and ensure system behavior is secure and compliant.
• Maintain test environments & test identities — Manage IAM test environments, provisioning/de-provisioning of test users, maintain identity data for testing, ensure test environments mimic production as closely as possible (roles, permissions, auth flows, federation).
group id: COMPHLP