H
Zero Trust Analyst
Hays
Vienna · On-site Contract $55 – $63/hr Yesterday
About the role
Role Description
- The Zero Trust Analyst is responsible for analyzing existing network, identity, and access configurations to determine what can be reused, refined, or must be newly created to support Zero Trust Analyst policies. This role focuses on investigation, discovery, and design input, not rule implementation.
- The analyst works closely with Zero Trust Engineers, application owners, IAM teams, and firewall/security teams to ensure Zero Trust policies are grounded in accurate understanding of the current environment and avoid unnecessary duplication or overly permissive controls.
- Analyze existing network security rules, firewall policies, address groups, and user/group-based access controls to determine Zero Trust applicability and reuse.
- Review current identity sources (AD, Entra ID, IGA, RBAC structures) to identify reusable groupings or role models for Zero Trust enforcement.
- Assess application access patterns (web, console, database, API, internal services) to understand required network paths and trust boundaries.
- Identify gaps, overlaps, and overly permissive rules that must be remediated to align with Zero Trust principles.
Zero Trust Readiness Assessment
- Determine whether existing firewall rules, user groups, and address objects can be leveraged or must be redesigned for Zero Trust enforcement.
- Document required net new security objects, including user groups, address groups, application definitions, and metadata dependencies.
- Support application onboarding by validating that proposed Zero Trust rules meet least privilege access requirements.
Skills & Requirements
- 5-10 years exp
- Enterprise network security & firewall analysis (zones, L4/L7 rules, traffic flows)
- Experience reviewing enterprise firewall rule-bases (Palo Alto or similar)
- Identity & access control analysis (Active Directory, Entra ID, RBAC)
- Application access & trust boundary assessment (web, API, DB, internal services)
- Strong security documentation & analysis skills
- Strong understanding of network security fundamentals (firewalls, zones, L4/L7 rules).
- Experience analyzing enterprise firewall rule-bases (Palo Alto or similar).
- Familiarity with identity-based access controls (AD groups, Entra ID groups, RBAC).
- Ability to read and interpret complex security configurations and translate them into actionable requirements.
- Experience documenting security findings in a clear, structured manner.
- Experience with Zero Trust Network Access (ZTNA) or user-based firewall policies.
- Exposure to IAM, IGA, or identity governance tooling.
- Familiarity with CMDB, application identifiers, and service onboarding workflows.
- Prior experience supporting audits or security assessments.
Benefits/Other Compensation
This position is a contract/temporary role where Hays offers you the opportunity to enroll in full medical benefits, dental benefits, vision benefits, 401K and Life Insurance ($20,000 benefit).
Skills
Active DirectoryAPICMDBEntra IDFirewallIGAIAMPalo AltoRBACZTNA
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free