The Zero Trust Security Analyst is responsible for analyzing existing network, identity, and access configurations to determine what can be reused, refined, or must be newly created to support Zero Trust security policies. This role focuses on investigation, discovery, and design input, not rule implementation.
The analyst works closely with Zero Trust Engineers, application owners, IAM teams, and firewall/security teams to ensure Zero Trust policies are grounded in accurate understanding of the current environment and avoid unnecessary duplication or overly permissive controls.
Key Responsibilities
Discovery & Analysis
- Analyze existing network security rules, firewall policies, address groups, and user/group-based access controls to determine Zero Trust applicability and reuse.
- Review current identity sources (AD, Entra ID, IGA, RBAC structures) to identify reusable groupings or role models for Zero Trust enforcement.
- Assess application access patterns (web, console, database, API, internal services) to understand required network paths and trust boundaries.
- Identify gaps, overlaps, and overly permissive rules that must be remediated to align with Zero Trust principles.
Zero Trust Readiness Assessment
- Determine whether existing firewall rules, user groups, and address objects can be leveraged or must be redesigned for Zero Trust enforcement.
- Document required net new security objects, including user groups, address groups, application definitions, and metadata dependencies.
- Support application onboarding by validating that proposed Zero Trust rules meet least privilege access requirements.
Documentation & Handoff
- Produce clear analysis artifacts that define:
- What exists today
- What can be reused
- What must be created new
- Provide structured inputs to Zero Trust Engineers for rule implementation and firewall request packages.
- Maintain traceability between application identifiers, security objects, and Zero Trust policies for audit and compliance purposes.
Required Skills & Experience
- Strong understanding of network security fundamentals (firewalls, zones, L4/L7 rules).
- Experience analyzing enterprise firewall rule-bases (Palo Alto or similar).
- Familiarity with identity-based access controls (AD groups, Entra ID groups, RBAC).
- Ability to read and interpret complex security configurations and translate them into actionable requirements.
- Experience documenting security findings in a clear, structured manner.
Preferred Qualifications
- Experience with Zero Trust Network Access (ZTNA) or user-based firewall policies.
- Exposure to IAM, IGA, or identity governance tooling.
- Familiarity with CMDB, application identifiers, and service onboarding workflows.
- Prior experience supporting audits or security assessments.
Success Looks Like
- Minimal rework due to accurate upfront analysis.
- Clear reuse of existing controls where appropriate.
- Well-defined, least privilege Zero Trust requirements handed to engineering teams.
CC Pace is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate on the basis of race, color, religion, sex, national origin, age, disability, genetic information, or any other protected characteristic under federal, state, or local laws.
CC Pace are committed to employing only candidates who are legally authorized to work in the United States. For us to comply with the Immigration Reform and Control Act of 1986, all new employees, as a condition of employment, must complete the Employment Eligibility Verification Form I-9 and provide documentation that establishes identity and authorization to work. E-Verify will be used for employment verification as part of your onboarding process.
CC Pace values integrity throughout our hiring process. As part of our standard verification procedures, candidates will be asked to provide documentation confirming employment history, education, and work authorization.
