OTIOSE/ADULTHOOD/SECURITY CONSULTANT
A D U L T H O O D
The Corporate Bestiary
FILE RECORD: SECURITY-CONSULTANT

What does a Security Consultant actually do?

[01] THE ORG-CHART ARCHITECTURE

* The organizational hierarchy defining the pressure flow and extraction cycle for this role.
KNOWN ALIASES / DISGUISES:
Information Security AdvisorCyber Risk AnalystCompliance Lead (Security)IT Security Strategist

[02] THE HABITAT (NATURAL RANGE)

  • Large Enterprise IT Departments (especially financial or government)
  • Consulting Firms (Big 4 and boutique shops)
  • Organizations undergoing regulatory audits or compliance mandates

[03] SALARY DELUSION

MARKET AVERAGE
$155551
* The average salary for a Cyber Security Consultant is $155,551 per year in United States. Top earners have reported making up to $261,046 (90th percentile).
"This figure compensates for the emotional labor of constantly reminding adults to lock their digital doors and the stress of potential, yet unlikely, actual breaches, alongside the performative act of 'risk management'."

[04] THE FLIGHT RISK

FLIGHT RISK:85%HIGH RISK
[DIAGNOSIS]Often external contractors or internal staff in easily outsourced roles, they are prime targets for cost-cutting measures, especially when compliance goals are met or the 'security theater' budget is reallocated.

[05] THE BULLSHIT METRICS

Number of Security Policies Published/Updated
Quantifying bureaucratic output; more documents equal more 'security' in the eyes of auditors, regardless of actual implementation or efficacy.
Vulnerabilities Identified (not necessarily remediated)
Focuses on the volume of discovered issues, shifting the burden of remediation onto other teams, creating a perception of vigilance without direct responsibility for resolution.
Security Awareness Training Completion Rates
Measuring how many employees clicked through a mandatory online module, providing plausible deniability when human error inevitably leads to a breach.

[06] SIGNATURE WEAPONRY

Compliance Checklists
An exhaustive list of checkboxes, often derived from frameworks like ISO 27001 or NIST, used to prove 'security posture' regardless of actual resilience or threat landscape.
Risk Registers
An ever-growing spreadsheet cataloging theoretical vulnerabilities and their 'impact scores,' primarily serving as a documentation trail to deflect accountability post-incident.
Penetration Testing Reports (Outsourced)
Often commissioned from third parties, these reports are then distilled and presented as the consultant's 'findings,' serving as a critical artifact for justifying existence and further budget.

[07] SURVIVAL / ENCOUNTER GUIDE

[IF ENGAGED:]Nod politely, agree to their 'critical findings' in principle, and then politely inform them your team has 'higher priority deliverables' for the next two quarters, ensuring their recommendations remain perpetually on a backlog.

[08] THE JD AUTOPSY: WHAT DO THEY ACTUALLY DO?

LINKEDIN ILLUSION
[SOURCE REDACTED]
"A security consultant safeguards an organisation’s critical assets."
OTIOSE TRANSLATION
A security consultant ensures the organization can claim 'due diligence' when critical assets are inevitably compromised, shifting blame from executive negligence to 'unforeseen external factors'.
LINKEDIN ILLUSION
[SOURCE REDACTED]
"They assess and evaluate the organisation’s security measures to identify potential vulnerabilities and develop strategies to minimise risk."
OTIOSE TRANSLATION
They run automated scanners, document the predictable findings in voluminous reports, and propose generic, often impractical, 'strategies' that are rarely implemented due to budget or operational friction.
LINKEDIN ILLUSION
[SOURCE REDACTED]
"They also contribute to developing security policies and guide the implementation of security controls."
OTIOSE TRANSLATION
They copy-paste industry-standard security policies and then engage in endless, circular debates with operational teams about 'guidance' on controls, without ever directly owning the implementation or its failure.

[09] DAY-IN-THE-LIFE LOG

[10:00 - 11:00]
Compliance Framework Review & Internal Audit Prep
Deep dive into the latest version of ISO 27001 or NIST CSF, cross-referencing against existing corporate policies, and generating 'evidence' for upcoming audits that demonstrates adherence on paper.
[13:00 - 14:00]
Risk Register Update & 'Strategic' Discussion
Categorizing new theoretical threats, assigning arbitrary 'likelihood' and 'impact' scores, followed by a meeting to 'strategize' mitigation plans that will never materialize due to resource constraints.
[15:00 - 16:00]
Vendor Security Assessment Questionnaire
Sending out exhaustive security questionnaires to third-party vendors, then meticulously documenting their often vague or incomplete responses to ensure organizational liability is 'transferred' in the event of a supply chain compromise.

[10] THE BURN WARD (UNFILTERED COMPLAINTS)

* The stark reality of the role, scraped from Reddit, Blind, and anonymous career boards.
"Honestly, 90% of my job is just making sure we *look* compliant for the auditors, not actually making anything more secure. It's all theater until a real breach happens, then it's 'consultants didn't flag this obscure edge case!'"
r/cybersecurity
"Being a 'security consultant' internally just means you're the designated nagger. You tell teams their config is insecure, they ignore you because it's 'too much work,' and then you document it so it's *their* fault when shit hits the fan."
teamblind.com
"We get paid six figures to write reports based on automated scans that dev teams could run themselves. The real value is having someone external to sign off on the blame."
r/cscareerquestions

[11] RELATED SPECIMENS

[VIEW FULL TAXONOMY] ↗
SYSTEM MATCH: 98%
Lead Backend Data Procurement Analyst
Spend weeks documenting trivial manual data entry, then propose a custom Python script that breaks every month, requiring constant maintenance from actual developers.
SYSTEM MATCH: 91%
Enterprise Architect
Preside over an endless cycle of abstract discussions, ensuring no single technical decision is made without involving a committee, thus guaranteeing maximum inefficiency.
SYSTEM MATCH: 84%
SDET
To craft intricate Rube Goldberg machines of automated 'checks' that prove the obvious, then spend cycles 'monitoring' their inevitable flakiness, ensuring a constant stream of 'maintenance' tasks to justify continued existence.
PRODUCED BYOTIOSEOTIOSE icon
OTIOSE LogoHOMEWhat does a Security Consultant do? Salary, Meaning & Reality | ADULTHOOD | OTIOSE