Share

Related Links

  • Barclay Simpson
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Top 5 Stories

News

Barclay Simpson publishes first quarterly rate card for security contractors

15 November 2011

Barclay Simpson’s information security contract division has published its first quarterly rate card for contractors in the IT security industry, noting that technology risk consultants can earn £710 a day, ranging down to data privacy analysts who can command £475 a day.

These rates, Infosecurity notes, include agency fees and mark-ups, but reflect what the firm claims is the `going rate’ for IT security contractors throughout the UK to the private and public sectors.

Prices, says the company, will vary depending on the length of contract, experience required and the location of the role, which can include internal & IT audit, risk management, information security, compliance, legal and treasury disciplines.

Barclay Simpson adds that its information security contract division has now been established for four years and in that time the division has registered over 2,000 active information security contractors within the UK.

A security policy consultant, says the firm, can command £590 per day, while security project and security programme manager can earn, respectively, £650 and £770 a day.

A security consultant, meanwhile, can earn £590 per day, whilst a security analyst can command £355 a day.

Pen testers can charge £590 a day, whilst ISO 27001 consultants are charging – on average - £530 for a day’s work.

Before you all resign your current positions, Infosecurity notes that these rates are the fees that agencies charge commercial clients on a daily basis, so the rates will need to be reduced by between 20 or 30%.

It is also worth noting that holidays and sick pay are not factored in to these rates, although third-party sites such as Peopleperhour.com and Elance.com also now quote these types of rates.

 

This article is featured in:
Business Continuity and Disaster Recovery  •  Compliance and Policy  •  Industry News  •  Internet and Network Security  •  IT Forensics  •  Security Training and Education

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×