Job Description
Company: EDGE Services, Inc.
Location: Vienna, US
This is a contract position with a hybrid schedule requiring 3 days onsite in Vienna, VA.
In this role, you will:
The analyst works closely with Zero Trust Engineers, application owners, IAM teams, and firewall/security teams to ensure Zero Trust policies are grounded in accurate understanding of the current environment and avoid unnecessary duplication or overly permissive controls.
Key Responsibilities:
Discovery & Analysis
• Analyze existing network security rules, firewall policies, address groups, and user/group-based access controls to determine Zero Trust applicability and reuse.
• Review current identity sources (AD, Entra ID, IGA, RBAC structures) to identify reusable groupings or role models for Zero Trust enforcement.
• Assess application access patterns (web, console, database, API, internal services) to understand required network paths and trust boundaries.
• Identify gaps, overlaps, and overly permissive rules that must be remediated to align with Zero Trust principles.
Zero Trust Readiness Assessment
• Determine whether existing firewall rules, user groups, and address objects can be leveraged or must be redesigned for Zero Trust enforcement.
• Document required net new security objects, including user groups, address groups, application definitions, and metadata dependencies.
• Support application onboarding by validating that proposed Zero Trust rules meet least privilege access requirements.
Documentation & Handoff
Produce clear analysis artifacts that define:
• What exists today
• What can be reused
• What must be created new
The skills we are looking for in this role include:
• Strong understanding of network security fundamentals (firewalls, zones, L4/L7 rules).
• Experience analyzing enterprise firewall rule-bases (Palo Alto or similar).
• Familiarity with identity-based access controls (AD groups, Entra ID groups, RBAC).
• Ability to read and interpret complex security configurations and translate them into actionable requirements.
• Experience documenting security findings in a clear, structured manner.
• Experience with Zero Trust Network Access (ZTNA) or user-based firewall policies.
Source: LinkedIn