Job Description
Company: PTSOL ® – Progressive Technology Solutions
Location: Tysons, US
Job Title: Zero Trust Security Analyst
Location: Tysons Corner, VA
Duration: 6+ months contract
W2 Candidates only
About the Role
We are seeking a detail-oriented Zero Trust Security Analyst to drive the discovery and analysis needed for a successful Zero Trust transformation. In this role, you will assess existing network, identity, and access configurations—determining what can be reused, refined, or built from scratch—to inform least-privilege security policies. You will not implement rules; instead, you’ll provide critical design inputs to engineering teams, ensuring Zero Trust controls are accurate, efficient, and avoid overly permissive access.
Key Responsibilities
• Analyze firewall policies, address groups, identity sources (AD, Entra ID, IGA, RBAC), and application access patterns to evaluate Zero Trust readiness.
• Identify gaps, overlaps, and reusable security objects (user groups, address groups, application definitions).
• Document clear findings: what exists today, what can be reused, and what must be newly created.
• Partner with Zero Trust Engineers, IAM, and application owners to validate least-privilege requirements and support application onboarding.
• Maintain traceability between application identifiers, security objects, and Zero Trust policies for audit readiness.
Required Skills & Experience
• Strong grasp of network security fundamentals (firewalls, zones, L4/L7 rules).
• Hands-on experience analyzing enterprise firewall rulebases (Palo Alto or similar).
• Familiarity with identity-based access controls (AD/Entra ID groups, RBAC).
• Ability to translate complex security configurations into actionable, structured requirements.
Preferred Qualifications
• Experience with Zero Trust Network Access (ZTNA) or user-based firewall policies.
• Exposure to IAM/IGA tools, CMDB, or service onboarding workflows.
• Background in audit or security assessments.
What Success Looks Like
• Minimal rework due to accurate upfront analysis.
• Maximum reuse of existing controls where appropriate.
• Clear, least-privilege Zero Trust requirements delivered to engineering teams.
Why Join Us?
Be a key player in a high-impact Zero Trust initiative—shaping policy design without getting lost in implementation. Work alongside top engineers and identity experts in a collaborative, security-first environment.
Source: LinkedIn