Negotiable
Inside
Remote
England, UK
Summary: The Cyber Security Consultant role focuses on delivering cyber security assessments and aligning with CIS Controls, particularly 12 and 13. The position requires strong communication skills and experience in a client-facing environment. The consultant will produce high-quality reports and contribute to client growth and thought leadership. This is a remote role with occasional visits to the London office.
Key Responsibilities:
- Deliver cyber security assessments, audits, and control reviews
- Identify risks and provide clear, pragmatic recommendations
- Focus on aligning with frameworks CIS Controls (particularly 12 and 13)
- Produce high-quality reports, risk assessments, and advisory outputs
- Contribute to client growth, proposals, and thought leadership
Key Skills:
- Extensive experience working CIS Controls
- Strong communication and stakeholder engagement skills
- Experience in a client-facing or consulting environment (preferred)
- Ability to balance technical understanding with business risk
Salary (Rate): undetermined
City: undetermined
Country: UK
Working Arrangements: remote
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Cyber Security Consultant (CIS Controls 12 +13)
Remote with occasion London office visits
Inside ir35
The Role
Deliver cyber security assessments, audits, and control reviews
Identify risks and provide clear, pragmatic recommendations
Focus on aligning with frameworks CIS Controls (particularly 12 and 13)
Produce high-quality reports, risk assessments, and advisory outputs
Contribute to client growth, proposals, and thought leadership
What They're Looking For
Extensive experience working CIS Controls
Strong communication and stakeholder engagement skills
Experience in a client-facing or consulting environment (preferred)
Ability to balance technical understanding with business risk
Nice To Have
Certifications such as CISSP, CISM, CISA, or ISO 27001 Lead Auditor
Exposure to cloud security (AWS, Azure, GCP)
Understanding of SIEM, vulnerability management, or security tooling
Any exposure to Operational Technology (OT) environments