Cyber Security Consultant

twentyAI
Greater London
1 month ago
Create job alert

Initial consult duration: 6-8 week estimate (opportunity to lead later project once approved)

Customer Sector: Education

OVERVIEW

We are seeking a Freelance EDR (Endpoint Detection and Response) Consultant to evaluate, recommend, and optimize the cybersecurity infrastructure for an international education network. The consultant will focus on assessing the existing EDR solutions and providing expert recommendations for improving endpoint security across the organization’s systems, particularly for a diverse set of international schools and educational institutions. This project requires an experienced cybersecurity professional with a strong understanding of EDR technologies and their application in large & fragmented environments.

KEY RESPONSIBILITIES

  1. EDR Assessment & Analysis:
    • Conduct a thorough evaluation of the current EDR solutions in place across the network, identifying gaps, inefficiencies, and areas for improvement.
    • Analyze the performance, cost-effectiveness, and coverage of existing EDR solutions, with a specific focus on meeting the cybersecurity needs of educational institutions.
    • Review current endpoint security configurations and assess whether the existing EDR tools are sufficient for the organization’s diverse IT environments, including both centralized and decentralized setups.
  2. Solution Recommendations:
    • Provide expert recommendations on the selection of EDR tools that best meet the organization’s needs. This may include recommending alternative solutions, considering pricing models, feature sets, and scalability.
    • Advise on advanced EDR features and configurations, such as threat detection, incident response, real-time monitoring, and automatic remediation.
    • Assist in determining whether the current EDR tools (or others under consideration) integrate effectively with the organization's broader IT infrastructure, especially Microsoft-based systems.
  3. Customization & Optimization:
    • Tailor recommendations to optimize the effectiveness of EDR tools within the unique context of educational institutions, considering the varying levels of IT maturity and resources available at each group entity (approx. 50 locations / customers within the group).
    • Ensure that proposed solutions are scalable, easy to manage, and can be efficiently deployed across multiple schools and international locations.
    • Work with internal teams to refine configurations and settings to enhance endpoint security posture and streamline operations.
  4. Documentation & Reporting:
    • Prepare a comprehensive report outlining the findings from the EDR assessment, including a clear comparison of current and recommended solutions.
    • Present actionable steps for optimizing the existing EDR infrastructure and propose a roadmap for deployment, including cost and time estimates.
    • Provide clear documentation on recommended configurations, best practices, and potential risks associated with the implementation of new solutions.
  5. Stakeholder Collaboration:
    • Work closely with the internal IT team, including engineers and IT managers, to understand the specific needs of each school and align EDR solutions accordingly.
    • Engage with key decision-makers to discuss findings and recommendations, ensuring buy-in from leadership for proposed changes.
    • The consultant is expected to provide a full evaluation and actionable recommendations by June, in time for the preparation of the new budget cycle starting in September.
    • Ensure that all deliverables are completed on time and that the recommendations can be seamlessly integrated into the existing IT infrastructure.

Key Requirements:

  • Proven experience in EDR solutions and cybersecurity consulting, particularly in large-scale environments such as education or international organizations.
  • Deep understanding of endpoint security technologies, including threat detection, response, and remediation.
  • Familiarity with leading EDR solutions (e.g., CrowdStrike, SentinelOne, Sophos) and the ability to assess their suitability in diverse IT landscapes.
  • Ability to work independently, with minimal supervision, while maintaining strong communication with internal stakeholders and leadership teams.
  • Excellent problem-solving skills, with the ability to diagnose and troubleshoot complex security issues related to endpoint protection.

Additional Information:

  • The consultant will be required to attend key meetings on-site for stakeholder collaboration in London and surrounding areas (within a 1.5-hour radius). Travel expenses will be covered.
  • This is a short-term freelance role with a focus solely on EDR-related needs, with the opportunity for continued collaboration on further IT security initiatives.

Seniority level

  • Mid-Senior level

Employment type

  • Contract

Job function

  • Information Technology, Consulting, and Education

Industries

  • Education, Hospitality, and Hospitals and Health Care

#J-18808-Ljbffr

Related Jobs

View all jobs

Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Non‑Technical Professionals: Where Do You Fit In?

Defence Needs More Than Hackers in Hoodies When headlines warn of ransomware crippling hospitals or deepfakes swaying elections, we picture hoodie‑clad hackers and elite penetration testers. Yet the reality of the UK’s cyber security sector is broader—and desperately short of talent. The Department for Science, Innovation & Technology (DSIT) estimates a shortfall of 11,200 cyber security professionals in 2024, while 43 % of advertised roles require governance, risk or communication skills rather than hands‑on technical exploits. Put plainly: if you can guide policy, manage projects, interpret regulations or inspire behaviour change, cyber security wants you. This guide highlights the fastest‑growing non‑technical roles, the transferable skills you already possess, and a concrete 90‑day plan to land a cyber security job—no packet sniffers required.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.