Design and Implement a Zero-Trust Security Architecture

Job Overview

Budget

$2,500.00

Level

Senior

Location

United States

Job Posted

22 Sep, 2025

Category

Cybersecurity

Total Proposals

0

Job Description

Overview:

We are a global tech company with a distributed workforce and a diverse set of cloud-based applications. Our traditional perimeter-based security model is no longer effective in protecting our assets.

The Challenge: 

Our security posture is based on the outdated "trust but verify" model, which assumes that everything inside our network is secure. This is not viable in a world where employees use personal devices and access corporate data from anywhere, making us highly vulnerable to insider threats and lateral movement by attackers.

Problems Caused:

The lack of a zero-trust model exposes us to significant security risks. A single compromised credential could allow an attacker to move freely across our network. This model also makes it difficult to manage and secure our assets in a modern, distributed environment.

Proposed Method:

We need a senior cybersecurity architect to design and implement a complete zero-trust security architecture. This includes:

  • Identity and Access Management (IAM): Implementing a robust IAM solution with granular access controls.
  • Micro-segmentation: Dividing our network into smaller, isolated segments.
  • Endpoint Security: Ensuring all devices, regardless of location, are secured and monitored.
  • Data Security: Implementing strong encryption and data loss prevention (DLP) policies.
  • Automation: Automating the security response to detected threats.

Required Experience:

At least 8+ years of experience in cybersecurity architecture. The freelancer must have a proven track record of designing and implementing complex security solutions.

Required Expertise:

  • Deep expertise in Zero-Trust principles and architecture.
  • Experience with Identity and Access Management platforms (Okta, Auth0, etc.).
  • Knowledge of micro-segmentation tools and techniques.
  • Proficiency in cloud security (AWS, Azure, GCP).

Sample Work Required:

Please provide a case study or technical documentation from a previous Zero-Trust implementation, highlighting the design choices, implementation challenges, and results.

Freelancer Proposal:

The freelancer should submit a detailed technical proposal outlining the full Zero-Trust architecture, including a phased implementation plan, a risk assessment, and a list of recommended technologies.

Skills

  • Compliance with server security regulations

Tags

Compliance with server security regulations

Author Spotlight

Tailer Smith

Tailer Smith

Client

No description available.

Related Jobs

1 year ago Senior
$65.00 Hourly

We are seeking a highly skilled Network Security Consultant to design and implement robust security protocols across our...

Firewall configuration and rules
View More
1 year ago Senior
$75.00 Hourly

We are seeking a highly skilled Cybersecurity Specialist to conduct comprehensive assessments and penetration tests to i...

Vulnerability assessment
View More
1 year ago Senior
$499.00 Fixed

We are seeking a certified Penetration Tester to conduct a comprehensive security audit on our web application. The test...

Penetration testing methodologies and tools
View More
1 year ago MidLevel
$2,000.00 Hourly

are building a Security Operations Center (SOC) and need a Cybersecurity Consultant to guide its architecture and implem...

Cybersecurity risk assessment and mitigation
View More
Tailer Smith

Tailer Smith

United States


Member Since
Oct 26, 2024
Total Created Jobs
6