Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

A Day in the Life of a Security Consultant

By Chris Smith
inspect-enews
December 13, 2016

Disclaimer: The author’s name has been changed to protect the privacy of the paranoid security expert.

 

A lack of skilled staff remains the top security concern for organizations, according to the State of Security Operations Report. One way organizations can mitigate this challenge is to hire security consultants. These professionals work closely with their clients to help solve issues, implement best practices, and provide guidance. While there are no two days that are alike, here’s my typical day in the life as a professional security consultant:

 

6:00 A.M.

Wake up to my phone’s alarm going off. Find my way across the dark hotel room towards my phone, which I always leave far from my bed to prevent any snoozing. Check emails, social media and text messages, and make sure there aren't any security emergencies that need my attention right away. I try to avoid using the hotel Wi-Fi, as these are typically public networks with little security, but when I do, I always make sure to use a VPN.  

 

6:15 A.M.

Head to the hotel's fitness center and turn on “Mr. Robot.” Being on the road and dining out for every meal can add pounds quickly, so it’s important to eat healthy and exercise while traveling.

 

7:30 A.M.

Shower, get ready and grab a double shot of espresso to help get my engines started. Most client engagements only last a week at a time, and I need to perform my best.

 

8:30 A.M.

Drive to client site in my rental car.

 

9:00 A.M.

Once I arrive, I check in at the front security desk, show ID, sign-in, and take care of any physical security requirements. Situations vary from being escorted around the office, given a visitor’s badge to wear, or getting my own photo ID badge that I can use to come and go as I please.

 

9:15 A.M.

Meet the client staff and host a kick-off meeting. Review the statement of work together to fully understand the client's expectations and security challenges.

 

10:00 A.M.

Get down to business. Depending on the client, I may be able to connect to their environment with my own laptop, use a workstation they provide, or instruct the client to do the work through my guidance over a shared screen, projector or remote screen-sharing session. Clients all have varying degrees of security measures.

 

11:00 A.M.

I’m deep into my work now. I take detailed notes of what I need to do, any new tasks that are identified, and track what I've done. Keeping good notes makes it easier to author an engagement report at the end of the week, summarizing what was accomplished, recommendations for the client, and proposing next steps. It's crucial to communicate any risks to the client and management as soon as you identify them, and escalate or adjust your strategy as required. 

 

12:00 P.M.

Grab lunch.

 

1:00 P.M.

Grab another coffee if I need one, and work on the task at hand. 

 

2:00 P.M.

I've probably encountered at least one technical issue now that I need to troubleshoot. There’s not a single day that goes by where I don't learn something new. To investigate the issue, I troubleshoot what may be causing it, review log files, try to reproduce the issue, and utilize resources I have available to me. These could include reading product documentation, searching through our internal forum and knowledge base, or asking colleagues for their perspective on the issue. Even though I travel by myself most of the time, I have a strong team behind me for support. It's important to weigh the severity of the issue against the time you're willing to invest in solving it, so you stay on target with deliverables in the time you have scheduled. With enough troubleshooting you can crack almost all cases. 

 

3:00 P.M.

After resolving the issue, I'll communicate to the client the root cause, and how I was able to troubleshoot and resolve it. Clients really appreciate the knowledge transfer, and the step-by-step teaching enables them to troubleshoot similar issues in the future.

 

5:00 P.M.

Wrap up the day and close out with the client, discussing accomplishments and tomorrow’s activities. We try to stick to a maximum of eight hours of billable client work per day to prevent burnout, but sometimes duty calls for a late night of troubleshooting. Either way, it's my call to make, and this isn't a job where you're expected to stay late just to keep up appearances as a “team player.” You work hard and give it your very best during eight hours of the work day, then decompress and recharge, and resume the next day. When I get back to the hotel, I always latch the door and engage the deadbolt – you can never be too safe when it comes to security.

KEYWORDS: security career security consultant security inspections security risk assessment security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chris Smith, Information Security Solutions Architect, HPE Security, Hewlett Packard Enterprise

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Security and Life Safety Among Plans to Combat a Nuclear Terror Strike in the U.S.

    See More
  • touch ID on laptop keyboard

    70% of life sciences see a rise in insider data loss incidents

    See More
  • SEC0818-cover-feat-slide1_900px

    In a Day’s Work: The Fight to End Workplace Violence

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • High-Rise Security and Fire Life Safety, 3rd edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing