Zero Trust Security Analyst

May 12, 2026
$50 - $61 / hour

Job Description

Company: EDGE Services, Inc.

Location: Vienna, US

This is a contract position with a hybrid schedule requiring 3 days onsite in Vienna, VA.

In this role, you will:

The analyst works closely with Zero Trust Engineers, application owners, IAM teams, and firewall/security teams to ensure Zero Trust policies are grounded in accurate understanding of the current environment and avoid unnecessary duplication or overly permissive controls.

Key Responsibilities:

Discovery & Analysis
• Analyze existing network security rules, firewall policies, address groups, and user/group-based access controls to determine Zero Trust applicability and reuse.
• Review current identity sources (AD, Entra ID, IGA, RBAC structures) to identify reusable groupings or role models for Zero Trust enforcement.
• Assess application access patterns (web, console, database, API, internal services) to understand required network paths and trust boundaries.
• Identify gaps, overlaps, and overly permissive rules that must be remediated to align with Zero Trust principles.

Zero Trust Readiness Assessment
• Determine whether existing firewall rules, user groups, and address objects can be leveraged or must be redesigned for Zero Trust enforcement.
• Document required net new security objects, including user groups, address groups, application definitions, and metadata dependencies.
• Support application onboarding by validating that proposed Zero Trust rules meet least privilege access requirements.

Documentation & Handoff
Produce clear analysis artifacts that define:
• What exists today
• What can be reused
• What must be created new

The skills we are looking for in this role include:

• Strong understanding of network security fundamentals (firewalls, zones, L4/L7 rules).
• Experience analyzing enterprise firewall rule-bases (Palo Alto or similar).
• Familiarity with identity-based access controls (AD groups, Entra ID groups, RBAC).
• Ability to read and interpret complex security configurations and translate them into actionable requirements.
• Experience documenting security findings in a clear, structured manner.
• Experience with Zero Trust Network Access (ZTNA) or user-based firewall policies.

Source: LinkedIn