Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

A Day in the Life of a Security Consultant

By Chris Smith
inspect-enews
December 13, 2016

Disclaimer: The author’s name has been changed to protect the privacy of the paranoid security expert.

 

A lack of skilled staff remains the top security concern for organizations, according to the State of Security Operations Report. One way organizations can mitigate this challenge is to hire security consultants. These professionals work closely with their clients to help solve issues, implement best practices, and provide guidance. While there are no two days that are alike, here’s my typical day in the life as a professional security consultant:

 

6:00 A.M.

Wake up to my phone’s alarm going off. Find my way across the dark hotel room towards my phone, which I always leave far from my bed to prevent any snoozing. Check emails, social media and text messages, and make sure there aren't any security emergencies that need my attention right away. I try to avoid using the hotel Wi-Fi, as these are typically public networks with little security, but when I do, I always make sure to use a VPN.  

 

6:15 A.M.

Head to the hotel's fitness center and turn on “Mr. Robot.” Being on the road and dining out for every meal can add pounds quickly, so it’s important to eat healthy and exercise while traveling.

 

7:30 A.M.

Shower, get ready and grab a double shot of espresso to help get my engines started. Most client engagements only last a week at a time, and I need to perform my best.

 

8:30 A.M.

Drive to client site in my rental car.

 

9:00 A.M.

Once I arrive, I check in at the front security desk, show ID, sign-in, and take care of any physical security requirements. Situations vary from being escorted around the office, given a visitor’s badge to wear, or getting my own photo ID badge that I can use to come and go as I please.

 

9:15 A.M.

Meet the client staff and host a kick-off meeting. Review the statement of work together to fully understand the client's expectations and security challenges.

 

10:00 A.M.

Get down to business. Depending on the client, I may be able to connect to their environment with my own laptop, use a workstation they provide, or instruct the client to do the work through my guidance over a shared screen, projector or remote screen-sharing session. Clients all have varying degrees of security measures.

 

11:00 A.M.

I’m deep into my work now. I take detailed notes of what I need to do, any new tasks that are identified, and track what I've done. Keeping good notes makes it easier to author an engagement report at the end of the week, summarizing what was accomplished, recommendations for the client, and proposing next steps. It's crucial to communicate any risks to the client and management as soon as you identify them, and escalate or adjust your strategy as required. 

 

12:00 P.M.

Grab lunch.

 

1:00 P.M.

Grab another coffee if I need one, and work on the task at hand. 

 

2:00 P.M.

I've probably encountered at least one technical issue now that I need to troubleshoot. There’s not a single day that goes by where I don't learn something new. To investigate the issue, I troubleshoot what may be causing it, review log files, try to reproduce the issue, and utilize resources I have available to me. These could include reading product documentation, searching through our internal forum and knowledge base, or asking colleagues for their perspective on the issue. Even though I travel by myself most of the time, I have a strong team behind me for support. It's important to weigh the severity of the issue against the time you're willing to invest in solving it, so you stay on target with deliverables in the time you have scheduled. With enough troubleshooting you can crack almost all cases. 

 

3:00 P.M.

After resolving the issue, I'll communicate to the client the root cause, and how I was able to troubleshoot and resolve it. Clients really appreciate the knowledge transfer, and the step-by-step teaching enables them to troubleshoot similar issues in the future.

 

5:00 P.M.

Wrap up the day and close out with the client, discussing accomplishments and tomorrow’s activities. We try to stick to a maximum of eight hours of billable client work per day to prevent burnout, but sometimes duty calls for a late night of troubleshooting. Either way, it's my call to make, and this isn't a job where you're expected to stay late just to keep up appearances as a “team player.” You work hard and give it your very best during eight hours of the work day, then decompress and recharge, and resume the next day. When I get back to the hotel, I always latch the door and engage the deadbolt – you can never be too safe when it comes to security.

KEYWORDS: security career security consultant security inspections security risk assessment security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris Smith, Information Security Solutions Architect, HPE Security, Hewlett Packard Enterprise

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security and Life Safety Among Plans to Combat a Nuclear Terror Strike in the U.S.

    See More
  • touch ID on laptop keyboard

    70% of life sciences see a rise in insider data loss incidents

    See More
  • SEC0818-cover-feat-slide1_900px

    In a Day’s Work: The Fight to End Workplace Violence

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • High-Rise Security and Fire Life Safety, 3rd edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing