{"id":27111,"date":"2025-10-31T11:15:28","date_gmt":"2025-10-31T11:15:28","guid":{"rendered":"https:\/\/www.policybee.co.uk\/blog\/?p=27111"},"modified":"2025-11-14T11:12:21","modified_gmt":"2025-11-14T11:12:21","slug":"how-to-become-a-cybersecurity-consult","status":"publish","type":"post","link":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult","title":{"rendered":"How to become a cybersecurity consultant\u00a0"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit.png\" alt=\"An image showing the journey of how to become a cybersecurity consultant\" class=\"wp-image-27109\" style=\"object-fit:cover;width:300px;height:150px\" srcset=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit.png 600w, https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p><strong>In this guide:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#good-match\">Is consulting right for you?<\/a><\/li>\n\n\n\n<li><a href=\"#consultant-benefits\">The benefits of consulting<\/a><\/li>\n\n\n\n<li><a href=\"#consultant-daily\">What does a consultant do day-to-day?<\/a><\/li>\n\n\n\n<li><a href=\"#consultant-perm\">Consulting vs permanent employment<\/a><\/li>\n\n\n\n<li><a href=\"#skills-bills\">What skills do you need?<\/a><\/li>\n\n\n\n<li><a href=\"#strong-foundation\">Setting up your consultancy<\/a><\/li>\n\n\n\n<li><a href=\"#consultant-start\">How to become a cybersecurity consultant<\/a><\/li>\n\n\n\n<li><a href=\"#consultant-insurance\">Getting the right insurance<\/a><\/li>\n<\/ul>\n\n\n\n<p>The UK cybersecurity industry is huge. In 2025, it <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-security-sectoral-analysis-2025\/cyber-security-sectoral-analysis-2025#economic-contribution-of-the-uk-cyber-security-sector\" target=\"_blank\" rel=\"noreferrer noopener\">contributed over \u00a313 billion to the UK economy<\/a>. That\u2019s 12% more than in 2024. And it\u2019s only projected to keep growing.&nbsp;<\/p>\n\n\n\n<p>It\u2019s safe to say, there\u2019s never been a better time to become a cybersecurity consultant. Businesses both large and small are investing more and more in their cybersecurity, in response to the threat of traditional attacks, like phishing, and the <a href=\"https:\/\/www.ncsc.gov.uk\/report\/impact-ai-cyber-threat-now-2027\" target=\"_blank\" rel=\"noreferrer noopener\">future potential of AI-powered attacks<\/a>.&nbsp;<\/p>\n\n\n\n<p>If you have the experience and expertise, becoming a cybersecurity consultant can provide job security and a healthy payday long into the future.&nbsp;<\/p>\n\n\n\n<p>But how do you get started? And what should you know before you take the plunge?&nbsp;<\/p>\n\n\n\n<p>In this guide, we\u2019ll go through the pros and cons of being a cybersecurity consultant. As well as what you\u2019ll need to start your solo journey \u2013 from business basics to the realities of working for yourself.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"good-match\"><strong>Is it a good match?<\/strong><\/h2>\n\n\n\n<p>Before you get too ahead of yourself, you need to be sure that becoming a consultant is right for you.&nbsp;<\/p>\n\n\n\n<p>While the benefits of working for yourself are great, it isn\u2019t for everyone.&nbsp;<\/p>\n\n\n\n<p>First, consider your skills and experience.&nbsp;<\/p>\n\n\n\n<p>When a company hires a consultant, they\u2019re paying for the expertise and experience they\u2019re lacking themselves. Junior cybersecurity professionals are less likely to fill these gaps, so you might struggle to find work as a consultant if you\u2019re in this position.&nbsp;<\/p>\n\n\n\n<p>In other words, the more relevant experience you have, the easier you\u2019ll find the move into consulting.&nbsp;<\/p>\n\n\n\n<p>We\u2019ve already touched on how in-demand cybersecurity is. But certain skills will make it even easier to land clients. We\u2018ll touch on these more in a <a href=\"#skills-bills\">later section<\/a>.&nbsp;<\/p>\n\n\n\n<p>As a consultant, you\u2019ll also need to have the right mindset to succeed. Being an excellent communicator, problem solver, and collaborator is a must. You also need to be able to adapt to your clients&#8217; processes and approaches quickly, as well as continuously train to improve your skills.&nbsp;<\/p>\n\n\n\n<p>Finally, you\u2019ll face the challenges that all sole traders face. Long hours, variable month-to-month income, having to find your own work, and patience for a lot of admin.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"consultant-benefits\"><strong>The pros of becoming a cybersecurity consultant<\/strong><\/h2>\n\n\n\n<p>It\u2019s not all doom and gloom, we promise. There are plenty of great benefits to being a cybersecurity consultant.&nbsp;<\/p>\n\n\n\n<p>First, you have complete control over what clients you work for, what kind of projects you take on, and how much work you do.&nbsp;<\/p>\n\n\n\n<p>You can negotiate your work conditions, your hours, what tools you use, and whether you work remotely or from the client\u2019s office. The level of autonomy that comes with it is a big reason why many people move into consulting.&nbsp;<\/p>\n\n\n\n<p>Variety is another key pro for many consultants. One day you might be working for a finance firm on their cloud security configuration, the next day you\u2019re helping a charity build their security architecture from the ground up.&nbsp;<\/p>\n\n\n\n<p>Every client has their own unique challenges, so you\u2019ll avoid the monotony of a typical nine-to-five.&nbsp;<\/p>\n\n\n\n<p>One of the most attractive pulls of consulting is obvious: the earning potential. Depending on how experienced and specialised you are, you can easily out-earn a permanent, in-house position.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It&#8217;s also a great career to choose if you want to try your hand at a full-time leadership position in the future. The work you do and the people you meet as a consultant should prepare you well for a move up the ladder.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"consultant-daily\">The daily grind<\/h2>\n\n\n\n<p>Chances are you already work in cybersecurity, but the day-to-day of a consultant will probably differ a bit from what you\u2019re used to.&nbsp;<\/p>\n\n\n\n<p>Obviously, things will change depending on the project or client you\u2019re working on. And whether you\u2019re an advisory or technical consultant.&nbsp;<\/p>\n\n\n\n<p>Here are some typical daily activities you\u2019ll probably do regardless of your focus:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Attend project check-in calls\/meetings <\/strong>\u2013 helps you stay on top of project progress and review any recent incidents.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hands-on technical work or assessments <\/strong>\u2013 if you\u2019re a technical consultant, you could be testing systems for security flaws. If you\u2019re an advisory consultant, you might review strategic or planning documentation for cybersecurity risks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Documenting and reporting your work <\/strong>\u2013 everything you do has to be documented or reported on so the client can keep benefiting from your work once your contract ends. And so they\u2019re aware of what you\u2019re doing day-to-day.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Client workshops or presentations <\/strong>\u2013 you might be required to update the leadership team on your findings or present to the permanent cybersecurity team on your recommended fixes.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Collaboration <\/strong>\u2013 working with the in-house staff to develop and implement changes.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Personal development <\/strong>\u2013 cybersecurity is evolving constantly. It\u2019s important to set aside time every day to keep on top of new threats, tools, and techniques.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These are just some general examples of day-to-day tasks. But these kinds of things, or variations of them, are what you\u2019ll typically be doing.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"consultant-perm\"><strong>Cybersecurity consulting vs permanent employment<\/strong><\/h2>\n\n\n\n<p>Your day-to-day might not sound too different to your current one, if you\u2019re already working in cybersecurity. But there are some pretty big differences to being a permanent employee.&nbsp;<\/p>\n\n\n\n<p>First, your focus as a consultant is a lot broader. Your focus will, even if you\u2019re technical, be more strategic and at a higher level. You might be hired to assess a business\u2019 incident response processes and provide recommendations. Or be contracted to conduct penetration tests for a set period of time and provide a detailed report.&nbsp;<\/p>\n\n\n\n<p>You also need to have good general knowledge of systems, as opposed to being focused on a company\u2019s specific infrastructure.&nbsp;<\/p>\n\n\n\n<p>As a cybersecurity consultant, you\u2019ll also be responsible for your own pension, insurance, sick pay, and other financials. And you\u2019ll have to handle everything else that comes with being your own boss, like paying tax, marketing yourself, and networking.&nbsp;<\/p>\n\n\n\n<p>Clients will also require you to be incredibly self-sufficient. Once you\u2019ve agreed a contract with them, it\u2019s on you to meet your deadlines and complete the work to the level required.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"skills-bills\"><strong>Skills to pay the bills<\/strong><\/h2>\n\n\n\n<p>Now it\u2019s time to think about the skills you have and what you might need to improve before you start your consulting career.&nbsp;<\/p>\n\n\n\n<p>There are certain technical skills and knowledge bases most employers will expect you to have. Here are some examples:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud security <\/strong>\u2013 most businesses now run their systems on the cloud. Whether through Microsoft, Amazon, or another provider.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identity &amp; access management <\/strong>\u2013 setting up multi-factor authentication, single sign-on systems, and other ways of stopping unauthorised access to sensitive systems and data.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Penetration testing &amp; ethical hacking <\/strong>\u2013 consultants are often hired to simulate attacks and expose weaknesses in security.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Compliance <\/strong>\u2013 clients will often ask you to advise on security frameworks, like <a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a>, <a href=\"https:\/\/www.gov.uk\/data-protection\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a>, and <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noreferrer noopener\">NIST CSF<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Incident response &amp; threat detection <\/strong>\u2013 helping businesses improve their ability to detect threats and quickly deal with them.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Network security fundamentals <\/strong>\u2013 setting up firewalls, VPNs, DDoS mitigation, and other basic security infrastructure.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Programming basics <\/strong>\u2013 being proficient in programming languages like Python, Java, and PowerShell is a must.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These are some general skills that give you a good base as a consultant. Extra skills, like AI and machine learning integration, security automation, and security architecture design, will help set you apart from other consultants.&nbsp;<\/p>\n\n\n\n<p>Outside of technical skills, employers value \u2018soft skills\u2019. Being a good communicator, having strong problem-solving and critical thinking skills, and managing stakeholders well will give your reputation a nice boost.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"strong-foundation\"><strong>Building a strong foundation<\/strong><\/h2>\n\n\n\n<p>Convinced a career in consulting is right for you? This is where that \u2018patience for admin\u2019 we mentioned is going to be needed.&nbsp;<\/p>\n\n\n\n<p>Before you start looking for work, you need to get set up. At a fundamental level, that means choosing how you\u2019ll work. There are several ways of doing this, each with their own pros and cons.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"868\" src=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-table-v2-1.png\" alt=\"A table showing the different ways a cybersecurity consultant can set up their business\" class=\"wp-image-27155\" style=\"width:600px\" srcset=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-table-v2-1.png 600w, https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-table-v2-1-104x150.png 104w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>Feels a bit overwhelming, right? A good starting point is to think about the type of work you want to do. And what you want your day-to-day to look like. As well as how much risk and admin you want to take on.&nbsp;<\/p>\n\n\n\n<p>You\u2019ll also notice that we\u2019ve mentioned IR35 a lot in the table above. If you\u2019ve never contracted before, or worked for yourself, it might be a bit confusing.&nbsp;<\/p>\n\n\n\n<p>In short, IR35 is a UK tax rule. It\u2019s designed to make sure you\u2019re actually working as an independent contractor and not as a permanent employee pretending to be a contractor.&nbsp;<\/p>\n\n\n\n<p>When you\u2019re \u201cinside IR35\u201d, you pay income tax and national insurance via PAYE, like any employee. It\u2019s most common you\u2019ll be inside IR35 if you\u2019re a subcontractor or agency contractor.&nbsp;<\/p>\n\n\n\n<p>If you\u2019re \u201coutside IR35\u201d, you\u2019re treated as a business for tax purposes. In these cases, you\u2019re allowed to pay yourself a mix of salary and dividends. This lets you keep more of your take-home pay. This is most often the case for limited companies and sole traders.&nbsp;<\/p>\n\n\n\n<p>This is where it gets a bit tricky. Your IR35 status can and will change between contracts. Why? Because it depends on the nature of work you\u2019re doing for each contract.&nbsp;<\/p>\n\n\n\n<p>IR35 is complex. Your best bet to get your head around it is to look at the <a href=\"https:\/\/www.gov.uk\/guidance\/understanding-off-payroll-working-ir35\" target=\"_blank\" rel=\"noreferrer noopener\">UK government\u2019s IR35 guidance<\/a>. Make sure you read it before you choose how to set up your business. It has all the rules and regs you need to be aware of and will answer any lingering questions you may have.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"consultant-start\"><strong>How to become a cybersecurity consultant<\/strong>&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve almost finished barraging you with information, but there\u2019s a bit more to come. Now that you\u2019re aware of the realities of contracting, it\u2019s time to set up your consultancy and get started.&nbsp;<\/p>\n\n\n\n<p>We\u2019ve put together a general step-by-step guide. We can\u2019t include everything, but it should give you a good starting point to help you get to day one.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Decide your business structure<\/strong><\/h3>\n\n\n\n<p>Use our guide above, as well as free resources like the <a href=\"https:\/\/helptogrow.campaign.gov.uk\/i-want-to-start-a-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">government\u2019s Help To Grow guide<\/a>, to decide how you\u2019ll structure your consultancy.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Register your business or sole trader status<\/strong><\/h3>\n\n\n\n<p>Once you\u2019ve decided what your structure will be, you\u2019ll need to do one of a few things. Either <a href=\"https:\/\/www.gov.uk\/limited-company-formation\/register-your-company\" target=\"_blank\" rel=\"noreferrer noopener\">register your business via Companies House<\/a>, <a href=\"https:\/\/www.gov.uk\/become-sole-trader\/register-sole-trader\" target=\"_blank\" rel=\"noreferrer noopener\">register for self-assessment tax returns<\/a> as a sole trader, or start researching agencies and umbrella companies you can apply for.&nbsp;<\/p>\n\n\n\n<p>A word of warning, if you\u2019re interested in pursuing the agency or umbrella route: make sure you <a href=\"https:\/\/www.gov.uk\/guidance\/working-through-an-umbrella-company\" target=\"_blank\" rel=\"noreferrer noopener\">know your rights<\/a>. Unfortunately, there are a lot of reports of fraudulent businesses operating in these areas. So, focus on finding reputable businesses with a lot of verifiable reviews.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Set up a business bank account<\/strong>\u00a0<\/h3>\n\n\n\n<p>If you\u2019ve decided on the limited company or sole trader route, you\u2019ll need to set up a business bank account. Limited companies have to do this for legal reasons. For sole traders, it\u2019s not a legal requirement, but it helps you keep your personal and business funds separate.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.moneysavingexpert.com\/banking\/business-bank-account\/\" target=\"_blank\" rel=\"noreferrer noopener\">MoneySavingExpert have a fantastic resource on business bank accounts<\/a> that can help you navigate all the options.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Organise your finances<\/strong>\u00a0<\/h3>\n\n\n\n<p>Umbrella workers are paid by PAYE. Simple.&nbsp;<\/p>\n\n\n\n<p>For other options, you\u2019ll need to do a bit more admin. There are a few routes you can take, depending on your projected take-home pay. If you\u2019re expecting to bring home a large amount each month, you could hire an accountant to help you manage your financial obligations.&nbsp;<\/p>\n\n\n\n<p>You could also use a reputable bookkeeping tool, like <a href=\"https:\/\/www.sage.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sage<\/a>, <a href=\"https:\/\/www.xero.com\/uk\" target=\"_blank\" rel=\"noreferrer noopener\">Xero<\/a>, and <a href=\"https:\/\/quickbooks.intuit.com\/uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">QuickBooks<\/a>. This is a much cheaper way of staying on top of your invoicing and other finances. But it will require a lot more of your time.&nbsp;<\/p>\n\n\n\n<p>If you opt to go down the sole trader route, don\u2019t forget about your <a href=\"https:\/\/www.gov.uk\/self-assessment-tax-returns\" target=\"_blank\" rel=\"noreferrer noopener\">self-assessment tax return<\/a>. You\u2019ll need to complete these every year, by law. Have a read of <a href=\"https:\/\/www.gov.uk\/guidance\/check-what-taxes-may-apply-to-you-as-a-sole-trader\" target=\"_blank\" rel=\"noreferrer noopener\">HMRC\u2019s sole trader guide<\/a>. It explains all the tax obligations and rules you\u2019ll need to be aware of.&nbsp;<\/p>\n\n\n\n<p>Limited companies have to prepare <a href=\"https:\/\/www.gov.uk\/prepare-file-annual-accounts-for-limited-company\" target=\"_blank\" rel=\"noreferrer noopener\">an annual accounts report and tax return<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5.<\/strong> <strong>Create your portfolio, CV, and online presence<\/strong>\u00a0<\/h3>\n\n\n\n<p>Even as a subcontractor or agency consultant, your reputation is everything. You can start building it from day one.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Build a professional CV and portfolio that demonstrates your skills and experience. Many consultants opt for an online portfolio. It\u2019s easy to link to prospective clients and you can use it as an extra demonstration of your technical prowess.&nbsp;<\/p>\n\n\n\n<p>You can either build it yourself or use a website builder like <a href=\"https:\/\/www.wix.com\/portfolio-website\" target=\"_blank\" rel=\"noreferrer noopener\">Wix<\/a> or <a href=\"https:\/\/www.squarespace.com\/websites\/create-a-portfolio\" target=\"_blank\" rel=\"noreferrer noopener\">Squarespace<\/a>.&nbsp;<\/p>\n\n\n\n<p>For limited companies and sole traders, you\u2019ll also need to market yourself. At least until you\u2019re embedded enough in the industry that you get a lot of business through word-of-mouth.&nbsp;<\/p>\n\n\n\n<p>You need to be actively working on your personal visibility via websites like <a href=\"https:\/\/www.linkedin.com\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a> and by attending in-person events and networking opportunities.&nbsp;<\/p>\n\n\n\n<p>In the beginning, make sure to use any contacts you\u2019ve built up from your pre-contracting career. Any recommendations or references can be gold dust when you\u2019re starting out and may help you land your first few contracts.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Join contractor networks and job boards<\/strong><\/h3>\n\n\n\n<p>Wondering where to start looking for contracts? When you\u2019re just starting, you\u2019re going to have to do a bit of legwork.&nbsp;<\/p>\n\n\n\n<p>Traditional job-seeking websites, like <a href=\"https:\/\/uk.indeed.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Indeed<\/a> and <a href=\"https:\/\/www.monster.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monster<\/a>, are always good to check for interesting opportunities. You might have more luck on tech-specific job boards, though. <a href=\"https:\/\/www.technojobs.co.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">TechnoJobs<\/a> and <a href=\"https:\/\/www.cwjobs.co.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">CWJobs<\/a> are a couple of examples.&nbsp;<\/p>\n\n\n\n<p>You should also contact cybersecurity or general IT recruitment agencies. Building relationships with specialist recruiters that cover cybersecurity is vital and can help you land jobs before they even become public.&nbsp;<\/p>\n\n\n\n<p>Conferences, tech summits, and contractor forums are another great way of making contacts that can lead to jobs. Try and make the time to attend big events like <a href=\"https:\/\/www.ncsc.gov.uk\/section\/keep-up-to-date\/cyberuk\" target=\"_blank\" rel=\"noreferrer noopener\">CYBERUK<\/a> and <a href=\"https:\/\/uk.cyberseries.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">UKsec<\/a>. They\u2019re also a good opportunity to develop and demonstrate those \u2018soft skills\u2019 we mentioned.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"consultant-insurance\">Get insured<\/h2>\n\n\n\n<p>We\u2019ve arrived at one of the final bits of housekeeping you\u2019ll need to before you hit \u2018send\u2019 on that first application: <a href=\"https:\/\/www.policybee.co.uk\/it-contractor-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">your insurance<\/a>.&nbsp;<\/p>\n\n\n\n<p>The only instance you may not need insurance is if you\u2019ve opted to go down the umbrella company route. Even then, make sure you double check with them whether you need your own insurance before you embark on your first contract.&nbsp;<\/p>\n\n\n\n<p>For everyone else, insurance is vital. After all, accidents happen. And at some point, you\u2019ll make a mistake. Or at least be accused of one.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Depending on the size of your contracts, and the types of clients you\u2019re working for, you could be facing a big bill to set things right. Especially if that mistake means you\u2019re in breach of the contract you signed.&nbsp;<\/p>\n\n\n\n<p>Whether it\u2019s a missed deadline, a client accusing you of not meeting a project\u2019s requirements, or your compliance recommendations failing to lead to certification.&nbsp;<\/p>\n\n\n\n<p>The more you grow your consultancy, the more pronounced this risk becomes.&nbsp;<\/p>\n\n\n\n<p>These are the types of insurance you\u2019ll probably need to protect yourself:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.policybee.co.uk\/professional-indemnity-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">Professional indemnity (PI) insurance<\/a> \u2013 covers you when a client accuses you of negligence, dishonesty, libel, slander, or breach of confidentiality. You might have misconfigured a firewall that led to a data breach, given bad compliance advice, or missed a critical vulnerability in a risk assessment. Whether it\u2019s your fault or not, PI insurance covers your legal fees and any compensation you might be due.\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.policybee.co.uk\/public-liability-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">Public liability (PL) insurance<\/a> \u2013 PL has a few great uses for a cybersecurity consultant. If you visit your client\u2019s premises, it covers you for third-party property damage and injury, if you\u2019re found to be at fault. Think a spilled cup of coffee on a piece of your client\u2019s equipment, leading to hardware damage. It covers any legal fees, compensation, and repair\/replacement of equipment.\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.policybee.co.uk\/portable-equipment-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">Portable equipment insurance<\/a> \u2013 certain contracts might require you to use your own equipment, like your mobile phone, laptop, and storage devices. Portable equipment insurance will pay to repair or replace it if it\u2019s damaged, lost, or stolen when you\u2019re out and about or at a client\u2019s premises.\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber insurance<\/a> \u2013 depending on a client\u2019s security policy and the sensitivity of their data, you might be required to store\/process their data on your own systems. If you experience a data breach and this data is lost or stolen, you could face a big bill from the client and a hit to your reputation. Cyber insurance is there to help you recover. It handles your legal defence, pays your legal fees and any compensation you might owe, and provides PR experts to manage your reputation.\u00a0<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Embarking on a new adventure<\/strong><\/h2>\n\n\n\n<p>Starting your consulting career can be just as stressful as it is exciting. Especially if you\u2019ve never worked for yourself before.&nbsp;<\/p>\n\n\n\n<p>Our advice is simple: take it step-by-step and be patient. Do everything you can to prepare before you leave your permanent position. If possible, line up a contract or two in advance to help you hit the ground running. It\u2019ll take a lot of that initial financial stress out of the equation.&nbsp;<\/p>\n\n\n\n<p>Looking for some help or advice with your <a href=\"https:\/\/www.policybee.co.uk\/it-contractor-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">IT consultants\u2019 insurance<\/a>? If you\u2019re ready to talk to a broker or just have any questions, give us a call on <strong>0345 222 5391.<\/strong>&nbsp;<\/p>\n\n\n\n<p><em>Images <\/em><strong><em>\u00a9<\/em><\/strong><em>PolicyBee 2025<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this guide: The UK cybersecurity industry is huge. In 2025, it contributed over \u00a313 billion to the UK economy. That\u2019s 12% more than in 2024. And it\u2019s only projected to keep growing.&nbsp; It\u2019s safe to say, there\u2019s never been &hellip; <a href=\"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[288,290,132],"tags":[310,314,312,300,158,162,161,309],"class_list":["post-27111","post","type-post","status-publish","format-standard","hentry","category-cyber-insurance","category-self-employed-and-freelance-advice","category-small-business-advice","tag-business-advice","tag-business-guides","tag-contractors","tag-cyber-insurance-2","tag-cyber-insurance","tag-it-and-technology","tag-it-contractors","tag-starting-a-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>How to become a cybersecurity consultant | PolicyBee<\/title>\r\n<meta name=\"description\" content=\"Thinking of trying consulting? Our guide on how to become a cybersecurity consultant has all the info you need to get started.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"How to become a cybersecurity consultant | PolicyBee\" \/>\r\n<meta property=\"og:description\" content=\"Thinking of trying consulting? Our guide on how to become a cybersecurity consultant has all the info you need to get started.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult\" \/>\r\n<meta property=\"og:site_name\" content=\"PolicyBee news and risk advice\" \/>\r\n<meta property=\"article:published_time\" content=\"2025-10-31T11:15:28+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2025-11-14T11:12:21+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"600\" \/>\r\n\t<meta property=\"og:image:height\" content=\"300\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"Pete Warner\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:site\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Warner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult\"},\"author\":{\"name\":\"Pete Warner\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\"},\"headline\":\"How to become a cybersecurity consultant\u00a0\",\"datePublished\":\"2025-10-31T11:15:28+00:00\",\"dateModified\":\"2025-11-14T11:12:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult\"},\"wordCount\":3055,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cyber-security-consultant-post-policybee-edit.png\",\"keywords\":[\"business advice\",\"business guides\",\"contractors\",\"cyber insurance\",\"cyber liability insurance\",\"IT and technology\",\"IT contractors\",\"starting a business\"],\"articleSection\":[\"Cyber insurance\",\"Self-employed &amp; freelance advice\",\"Small business advice\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult\",\"name\":\"How to become a cybersecurity consultant | PolicyBee\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cyber-security-consultant-post-policybee-edit.png\",\"datePublished\":\"2025-10-31T11:15:28+00:00\",\"dateModified\":\"2025-11-14T11:12:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\"},\"description\":\"Thinking of trying consulting? Our guide on how to become a cybersecurity consultant has all the info you need to get started.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult#primaryimage\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cyber-security-consultant-post-policybee-edit.png\",\"contentUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/cyber-security-consultant-post-policybee-edit.png\",\"width\":600,\"height\":300,\"caption\":\"An image showing the journey of how to become a cybersecurity consultant\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-become-a-cybersecurity-consult#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to become a cybersecurity consultant\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/\",\"name\":\"PolicyBee news and risk advice\",\"description\":\"Articles and information on professional indemnity insurance, small business news and risk management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/8503cbee1e5b3842c795256a0c5e53d0\",\"name\":\"Pete Warner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g\",\"caption\":\"Pete Warner\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to become a cybersecurity consultant | PolicyBee","description":"Thinking of trying consulting? Our guide on how to become a cybersecurity consultant has all the info you need to get started.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult","og_locale":"en_GB","og_type":"article","og_title":"How to become a cybersecurity consultant | PolicyBee","og_description":"Thinking of trying consulting? Our guide on how to become a cybersecurity consultant has all the info you need to get started.","og_url":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult","og_site_name":"PolicyBee news and risk advice","article_published_time":"2025-10-31T11:15:28+00:00","article_modified_time":"2025-11-14T11:12:21+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit.png","type":"image\/png"}],"author":"Pete Warner","twitter_card":"summary_large_image","twitter_creator":"@PolicyBee","twitter_site":"@PolicyBee","twitter_misc":{"Written by":"Pete Warner","Estimated reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult#article","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult"},"author":{"name":"Pete Warner","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0"},"headline":"How to become a cybersecurity consultant\u00a0","datePublished":"2025-10-31T11:15:28+00:00","dateModified":"2025-11-14T11:12:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult"},"wordCount":3055,"commentCount":0,"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit.png","keywords":["business advice","business guides","contractors","cyber insurance","cyber liability insurance","IT and technology","IT contractors","starting a business"],"articleSection":["Cyber insurance","Self-employed &amp; freelance advice","Small business advice"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult","url":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult","name":"How to become a cybersecurity consultant | PolicyBee","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult#primaryimage"},"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit.png","datePublished":"2025-10-31T11:15:28+00:00","dateModified":"2025-11-14T11:12:21+00:00","author":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0"},"description":"Thinking of trying consulting? Our guide on how to become a cybersecurity consultant has all the info you need to get started.","breadcrumb":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult#primaryimage","url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit.png","contentUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2025\/10\/cyber-security-consultant-post-policybee-edit.png","width":600,"height":300,"caption":"An image showing the journey of how to become a cybersecurity consultant"},{"@type":"BreadcrumbList","@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-become-a-cybersecurity-consult#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.policybee.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"How to become a cybersecurity consultant\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.policybee.co.uk\/blog\/#website","url":"https:\/\/www.policybee.co.uk\/blog\/","name":"PolicyBee news and risk advice","description":"Articles and information on professional indemnity insurance, small business news and risk management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policybee.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/8503cbee1e5b3842c795256a0c5e53d0","name":"Pete Warner","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f564969b62f9e2ddcd7857451a5fea06c6db345efc498dac09620887b63e2a89?s=96&d=mm&r=g","caption":"Pete Warner"}}]}},"_links":{"self":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=27111"}],"version-history":[{"count":10,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27111\/revisions"}],"predecessor-version":[{"id":27167,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27111\/revisions\/27167"}],"wp:attachment":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=27111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=27111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=27111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}