Top 10 Cybersecurity Consulting Firms in 2026 (Honest Breakdown) | Lorikeet Security Skip to main content
Back to Blog
Industry Report

Top 10 Cybersecurity Consulting Firms in 2026 (Honest Breakdown)

Lorikeet Security · April 18, 2026 · 18 min read
Disclosure: Lorikeet Security is one of the firms on this list. We have a commercial interest in how you perceive us. We have made a genuine effort to represent the nine other firms accurately — their strengths, their caveats, and the kinds of companies they actually fit. If you think we have misrepresented a competitor, email us at [email protected] and we will correct it. Treat this as one data point among several; speak to each firm and ask for references from companies that look like yours.

Cybersecurity consulting in 2026 is a $290 billion global market dominated by five kinds of firms: the Big Four (KPMG, Deloitte, PwC, EY), the large technology-aligned specialists (Mandiant, IBM X-Force, Accenture), the independent enterprise consultancies (NCC Group, Optiv), the mid-market PTaaS platforms, and a new wave of growth-stage challengers built specifically for the way modern SaaS companies ship software.

Picking the wrong kind of firm is one of the most expensive mistakes a security leader can make. A $750K Big Four engagement that delivers a 200-page maturity assessment no developer will ever read is not better than a $50K engagement from a firm that finds real flaws and files them directly into your issue tracker. Likewise, a Series A startup trying to hire a global consultancy to remediate a critical finding on a 72-hour deadline is going to be disappointed.

This post covers the ten firms we think most influence how cybersecurity consulting is actually delivered in 2026. We have grouped them by their dominant operating model — enterprise advisory, Big Four, specialized services, or challenger platform — and given honest strengths and caveats for each. Our methodology, ranking criteria, and fit-by-stage framework are at the top; detailed firm profiles follow; a master comparison table and decision framework sit at the end.


How We Picked the Top 10

We considered roughly 80 cybersecurity consulting firms with meaningful global or regional presence in 2026. To make the final list, a firm needed to clear all five of these bars:

  1. Material revenue from consulting services — not just product sales dressed up as advisory. Firms whose "consulting" is really implementation labor for their own SaaS were filtered out.
  2. Public client references and case studies — we excluded firms that operate entirely under NDA with no verifiable customer signal.
  3. Technical practitioner depth — we gave heavy weight to firms with in-house research teams, original vulnerability disclosures, and named practitioners who contribute publicly to the field.
  4. Compliance and regulatory signal — the firm must be able to deliver work that passes SOC 2, ISO 27001, PCI DSS, HIPAA, or sector-specific audits. Security that doesn't ship a compliant report is incomplete.
  5. Distinct positioning — we deliberately included one firm per category where similar alternatives existed. A list with five Big Four firms would not be useful.

We evaluated each firm on seven dimensions: breadth of services, depth of technical practitioners, speed of engagement kickoff, quality of deliverables, fit for growth-stage versus enterprise, pricing transparency, and how well their reports actually get used after delivery. We talked to security leaders at 26 organizations across Seed through Fortune 500 during the research window.

What this list is not This is not a Gartner Magic Quadrant. We don't rank firms in a linear order from "best" to "worst" because consulting fit is about context — the firm that is perfect for a 40-person SaaS company preparing for Series B is the wrong choice for a 200,000-employee bank rolling out a global identity program. Instead, each profile below names the company profile where the firm is a strong fit, and the profiles where you should probably look elsewhere.

Quick Comparison: All 10 Firms at a Glance

Before the detailed profiles, here is how the ten firms line up across the dimensions that matter most for buyers in 2026. Read this table first to orient yourself, then dig into the individual profiles for the firms that look relevant.

Firm Type Best Fit Typical Engagement Hourly Range
Mandiant Specialist (Google) Enterprise IR, threat intel $150K – $2M+ $350 – $550
KPMG Cyber Security Big Four Regulated enterprises, global programs $250K – $5M+ $350 – $600
Deloitte Cyber Big Four Transformation, multi-region rollouts $300K – $8M+ $400 – $650
Accenture Security Global integrator Transformation programs, MSSP $500K – $15M+ $300 – $600
PwC Cybersecurity Big Four Financial services, privacy, governance $250K – $4M+ $350 – $650
EY Cybersecurity Big Four Cyber M&A diligence, financial services $200K – $3M+ $350 – $600
IBM X-Force Specialist (IBM) Large enterprises with IBM stack $200K – $3M+ $300 – $550
NCC Group Independent boutique Technical offensive + cryptography $60K – $1.5M $280 – $500
Optiv US integrator US mid-market to enterprise $150K – $5M $275 – $500
Lorikeet Security Challenger (PTaaS) Seed to Series C, modern SaaS $7.5K – $150K Fixed-scope

A few things to note before you judge these ranges too harshly. First, Big Four and global integrator pricing assumes multi-month engagements with five-to-fifteen named resources; the per-hour rate in isolation misrepresents the actual cost. Second, the hourly figures are blended ranges, not starting rates — a senior partner at Deloitte will bill far above the $650 top of the range, and an apprentice consultant will bill below. Third, Lorikeet Security deliberately does not bill hourly; we quote fixed-scope engagements with a published price list. That is a commercial choice, not a quality claim.


1. Mandiant (Google Cloud)

1

Mandiant

Specialist
Reston, Virginia · Part of Google Cloud since 2022 · 2,500+ employees worldwide
Founded2004
SpecialtyIncident response, threat intelligence
PlatformMandiant Advantage
Notable ResearchAPT29, Volt Typhoon, Salt Typhoon

Mandiant is the name that shows up when a Fortune 500 company has been breached and the board wants the definitive word on what happened. Kevin Mandia's firm built its reputation on APT attribution — the 2013 APT1 report that named PLA Unit 61398 still defines how the industry talks about nation-state actors. Since the Google Cloud acquisition in 2022, Mandiant has been integrated into the Google Threat Intelligence offering while preserving its consulting brand and independence in assessments.

Their core strength is forensic incident response at the hardest end of the market: large breaches, advanced persistent threat campaigns, destructive attacks, and ransomware negotiation where the facts need to hold up in regulator filings and courtroom discovery. The threat intelligence they feed back into the consulting practice is a genuine differentiator — when Mandiant responders arrive on-site, they often already know what the attacker's next move will be because the same group is active at another client.

Their proactive services — red team, purple team, security program assessments, threat-led penetration testing — trade on the same bench. For enterprises that want their offensive testing informed by actual APT tradecraft rather than the OWASP Top 10, Mandiant is hard to beat. The trade-off is cost and accessibility: Mandiant's engagement minimums are high, the named senior consultants are booked months out, and the firm is architected for the Fortune 1000. A 40-person SaaS startup will struggle to even get a call back.

Where Mandiant Wins
  • Gold-standard breach and IR work, especially for regulator-facing incidents
  • Threat intelligence feeds that actively inform every engagement
  • Deep bench for nation-state adversary simulation
  • Credible to boards, insurers, regulators, and law enforcement
Where to Look Elsewhere
  • Not economical or accessible for companies under $50M ARR
  • Long engagement lead times for proactive work
  • Reports tend to be written for executives, not developers
  • Retainers often feel like insurance premiums rather than active engagement
Best for: Large enterprises and regulated institutions that want the strongest possible signal on incident response, breach investigation, and nation-state-informed adversary simulation. If you are filing an 8-K about a breach, Mandiant is the call.

2. KPMG Cyber Security Services

2

KPMG

Big Four
Amstelveen, Netherlands · 273,000 employees globally · Cyber practice ~8,000
Founded1987 (current form)
SpecialtyRisk, privacy, compliance
PlatformKPMG Cyber Response
TargetRegulated enterprise

KPMG's cyber practice is the smallest of the Big Four by headcount but often the most focused — they have leaned hard into risk, third-party assurance, privacy regulations, and critical infrastructure compliance. Their global footprint means a KPMG engagement for a multinational will typically get local partners in every jurisdiction you operate in, with local regulatory expertise baked in. That is very valuable when you are dealing with a patchwork of GDPR, NYDFS, UK DPA, APRA CPS 234, and Singapore MAS all at once.

Where KPMG excels is structured program advisory: you want a three-year security transformation roadmap, a board-level cyber risk quantification, a vendor risk program rollout, or a privacy-by-design implementation across a global organization. The deliverables are polished, the frameworks are thorough, and the partners are comfortable in a boardroom. Their technical penetration testing practice exists but is not the firm's strongest discipline; for pure offensive work, you will get better value elsewhere.

The honest trade-off with any Big Four engagement is leverage. The partner who sold you the deal will not run it day-to-day. Most of the work is delivered by senior managers and consultants whose quality varies significantly. The ones who are great are very great; the ones who are average are expensive. Insist on named resources, bios, and an interview process for the people actually delivering.

Where KPMG Wins
  • Global regulatory and privacy program design
  • Third-party risk and supply chain assurance at enterprise scale
  • Board and audit committee-ready deliverables
  • Cross-border engagements with local regulatory grounding
Where to Look Elsewhere
  • Technical offensive testing is not their strongest practice
  • Leverage-heavy staffing model — partner-sold, manager-delivered
  • Can feel slow and documentation-heavy for fast-moving SaaS
  • Price-to-value ratio is poor below $50M ARR
Best for: Regulated global enterprises — banks, insurers, healthcare, critical infrastructure — running multi-jurisdictional security and privacy programs, or preparing for regulator scrutiny.

3. Deloitte Cyber

3

Deloitte

Big Four
London, UK · ~457,000 employees · Cyber practice ~27,000
Founded1845 (1989 current)
SpecialtyTransformation, implementation
PlatformDeloitte MXDR, Cyber Academy
TargetGlobal enterprise

Deloitte has the largest cybersecurity practice in the Big Four and one of the largest in the world. They are built for transformation scale — multi-year enterprise-wide security program rollouts, global SOC implementations, identity and access modernization across 100,000-employee organizations, zero trust architecture design for federal agencies. The firm publishes the "Deloitte Future of Cyber" survey annually, which is a useful pulse check on where enterprise security leaders are investing.

Deloitte's managed services arm (MXDR) is a legitimate alternative to pure-play MSSPs for organizations that want a single vendor relationship that spans strategy, implementation, and run-state operations. Their cyber academy and training programs are well-regarded. And they have real federal and defense sector depth, which is valuable if you sell into government or operate critical infrastructure.

The downsides are the classic Big Four downsides, amplified by scale. Deloitte engagements tend to be long, expensive, and heavy on documentation. The quality of specific teams varies enormously by local office and partner — the Deloitte Financial Services cyber practice in New York is a very different animal from the Deloitte Risk practice in Bengaluru. For technical offensive work, you will again want a specialist. For program leadership, transformation, and run-state, Deloitte can be an excellent choice if you can afford it and your internal politics favor a tier-one name.

Where Deloitte Wins
  • Enterprise-wide transformation programs and global rollouts
  • Managed services with strategic advisory attached
  • Federal, defense, and public sector depth
  • Scale — thousands of practitioners across every geography
Where to Look Elsewhere
  • Technical offensive testing is not world-class
  • Extremely variable quality across offices and partners
  • Documentation-heavy deliverables that developers rarely read
  • Premium pricing that crowds out experimentation
Best for: Large enterprises and government agencies running multi-year cyber transformation programs, managed services, or federal compliance rollouts. Overkill for anyone under $100M ARR.

4. Accenture Security

4

Accenture Security

Global Integrator
Dublin, Ireland · ~738,000 employees · Security practice ~20,000
FoundedAccenture 2001 · Security from Symantec acquisition 2020
SpecialtyTransformation + MSSP
PlatformAccenture Managed Security
TargetGlobal 2000

Accenture is the largest global systems integrator, and Accenture Security is the largest cybersecurity practice inside any non-Big-Four firm. The Symantec consulting acquisition in 2020 gave them depth in threat intelligence and managed services; subsequent acquisitions of Innotec, Context, and Revolutionary Security expanded their capability across offensive, OT, and industrial cyber. Their managed security services arm competes directly with Deloitte MXDR, IBM, and pure-play MSSPs like Secureworks.

Where Accenture wins is when the cyber engagement is part of a broader technology transformation — cloud migration, ERP modernization, digital product launch, M&A integration — that Accenture is already delivering. Having one vendor own both the transformation and the security baked into it removes a class of handoff failures that destroy value. Their OT / industrial cyber practice is a real differentiator for manufacturing, energy, and utilities.

If you are not already working with Accenture on a transformation, buying cyber from them standalone is often not the best use of budget. The firm's pricing assumes a certain scale of engagement; a one-off $75K penetration test is an awkward fit for their delivery model. Below the F2000 scale, Accenture Security quickly becomes mis-sized.

Where Accenture Wins
  • Security baked into broader technology transformation programs
  • OT / industrial cyber for manufacturing, energy, and utilities
  • Global managed security services with 24x7 SOC capability
  • M&A integration with security built in from day one
Where to Look Elsewhere
  • Standalone security engagements are not their strength
  • Mid-market and below is a poor commercial fit
  • Offensive security is acquired capability, not organic strength
  • Engagement minimums crowd out tactical work
Best for: Global 2000 companies running technology transformations where cyber is one workstream among many. Excellent for OT/ICS security at industrial scale.

5. PwC Cybersecurity & Privacy

5

PwC

Big Four
London, UK · ~370,000 employees · Cyber & privacy practice ~12,000
Founded1998 (current form)
SpecialtyFinancial services, privacy
PlatformPwC Threat Intelligence
TargetFinancial services, regulated

PwC's cyber and privacy practice is the firm's answer to the Big Four cyber arms race. It is strongest in financial services — global banks, insurers, asset managers, capital markets infrastructure — where PwC's audit relationships and regulatory depth turn into strong cyber consulting. The UK and European financial services cyber teams have particularly good reputations; the US practice is solid but competes harder against Deloitte.

Where PwC stands out is privacy — GDPR, UK DPA, LGPD, CCPA/CPRA, Singapore PDPA, Australian Privacy Act — as a technical and regulatory discipline. Their privacy teams sit inside the cyber practice and the combination makes a lot of sense: modern privacy work cannot be done without deep technical knowledge of where data lives, how it flows, and how to prove to a regulator that you have controls in place. PwC also publishes a respected annual Global Digital Trust Insights survey.

PwC's offensive security capability has grown meaningfully over the last three years but is still a second-tier offering behind their advisory work. If you are a regulated financial institution that needs a cyber partner who also handles your privacy program and speaks fluently to your auditors, PwC is a good choice. If you are a SaaS company that needs a sharp web application pentest delivered in six weeks, you are better served elsewhere.

Where PwC Wins
  • Financial services cyber and privacy — especially in UK/Europe
  • Privacy program design across GDPR, CCPA, and equivalents
  • Audit-adjacent controls design that survives external scrutiny
  • Governance, risk, and regulatory engagement advisory
Where to Look Elsewhere
  • Offensive testing is not a signature strength
  • Audit independence rules may block dual-use relationships
  • Pricing and process overhead are Big Four standard
  • US practice is not as strong as UK and EMEA
Best for: Regulated financial institutions, especially in Europe, that need combined cyber and privacy advisory from a firm that speaks their regulators' language.

6. EY Cybersecurity

6

EY

Big Four
London, UK · ~395,000 employees · Cyber practice ~8,500
Founded1989 (current form)
SpecialtyCyber M&A, financial services
PlatformEY MDR
TargetCorporate, financial services

EY's cyber practice is smaller than Deloitte or KPMG but has two particular strengths. The first is cyber in the context of mergers and acquisitions — due diligence, deal-stage risk assessments, day-one integration, and carve-outs. When a private equity firm or corporate acquirer needs to understand the cyber exposure of a target before signing, EY's M&A cyber team is one of the most common calls. The second is financial services, where EY historically has deep audit relationships that translate into adjacent advisory work.

EY has invested in threat simulation and red teaming through targeted acquisitions, and their offensive practice is better than PwC or KPMG by a meaningful margin — though still behind specialists like Mandiant or NCC Group. Their managed detection and response offering (EY MDR) competes in the same space as Deloitte MXDR but is smaller in scale.

The firm is also known for its global cyber survey work and for being an early mover on AI governance and trustworthy AI — a capability that is increasingly important as regulators catch up to AI risks. If you are buying a cyber partner for an M&A transaction, EY is a strong pick. If you are buying for run-state security of a SaaS platform, it is not the first place to look.

Where EY Wins
  • Cyber in M&A — diligence, integration, and carve-outs
  • Corporate and financial services advisory
  • Emerging AI governance and trustworthy AI programs
  • Stronger offensive capability than PwC or KPMG
Where to Look Elsewhere
  • Smaller scale than Deloitte or KPMG limits engagement capacity
  • Technical depth inconsistent across offices
  • Not a first choice for SaaS or mid-market
  • Audit independence rules still apply to audit clients
Best for: Corporate and financial services buyers running M&A transactions, building AI governance programs, or needing Big Four assurance for investor-facing work.

7. IBM X-Force

7

IBM X-Force

Specialist
Armonk, New York · Part of IBM Consulting · ~5,500 cyber practitioners
FoundedX-Force: 1997 · IBM cyber practice: 2011+
SpecialtyThreat intel, incident response
PlatformIBM QRadar, X-Force Command Center
TargetLarge enterprise, IBM customers

X-Force is IBM's threat intelligence, offensive research, and incident response practice. The X-Force Threat Intelligence Index is one of the longer-running industry reports, published annually since the early 2010s, and the research team publishes original vulnerability and malware analysis that consistently lands in the major trade publications. When integrated with IBM Consulting's broader cyber practice, X-Force delivers across the full stack from research to advisory to managed services.

Where X-Force shines is large enterprises already running meaningful IBM stack — QRadar for SIEM, Guardium for data security, MaaS360 for mobile, Cloud Pak for Security, Red Hat for containers. Having the consulting firm that built the tools also operate them gives IBM a natural advantage in that segment. Their IR team is credible, if a step behind Mandiant and CrowdStrike in market mindshare.

The challenge is that IBM Consulting as a whole has gone through enough restructuring over the last decade that the cyber practice can feel uneven depending on which geography and which division you engage. Offensive testing is solid but not differentiated. Pricing is enterprise-standard. If you run IBM security stack at scale, X-Force is a natural partner; if you don't, there are sharper options at comparable or lower cost.

Where X-Force Wins
  • Deep integration with IBM security portfolio
  • Respected threat intelligence team and annual reporting
  • Mature IR practice with global reach
  • Strong mainframe and legacy enterprise environment coverage
Where to Look Elsewhere
  • Uneven practice quality across regions
  • Not the sharpest offensive shop in the market
  • Less compelling for modern cloud-native SaaS
  • Frequent restructuring inside IBM Consulting
Best for: Large enterprises running IBM security stack who want the same vendor to research, advise, and operate. Less relevant for cloud-native SaaS.

8. NCC Group

8

NCC Group

Independent Boutique
Manchester, UK · ~2,200 employees · Listed on London Stock Exchange
Founded1999
SpecialtyOffensive, cryptography, code review
PlatformManaged services + consulting
TargetEnterprise, tech companies

NCC Group is the largest independent cybersecurity consulting firm in the UK and one of the most technically respected globally. Acquisitions of Matasano Security and iSEC Partners in 2015 brought them some of the sharpest offensive security talent in the US, and the firm has consistently published high-quality research in cryptographic review, hardware security, embedded systems, and complex protocol analysis. If you need someone to review a novel cryptographic design or audit an embedded device, NCC is on the short list.

Their penetration testing and red teaming practice is deep, with particular strength in finance, healthcare, and critical infrastructure. They are one of the few firms that can credibly deliver CBEST and TIBER-EU threat-led pentesting for regulated financial institutions in the UK and EU. Their managed services arm has grown meaningfully but remains secondary to the consulting practice.

The honest trade-offs are scale and consistency. NCC has been through several strategic changes, and the US and UK practices have sometimes operated as if they were separate firms. The most senior practitioners are heavily in demand and may not run your engagement personally. Pricing sits above mid-market boutique but below Big Four, and the firm's public listing introduces quarterly-results pressure that occasionally affects staffing choices.

Where NCC Group Wins
  • Cryptographic review and complex protocol analysis
  • Hardware and embedded systems security
  • Threat-led regulatory pentesting (CBEST, TIBER-EU)
  • Deep offensive practice with strong research output
Where to Look Elsewhere
  • Senior talent is in high demand — may not run your engagement
  • Consistency varies between UK, US, and EMEA practices
  • Overkill for standard SaaS pentest needs
  • Public-company quarter-end pressures affect staffing
Best for: Technical enterprises with complex or novel surfaces — cryptography, hardware, embedded systems, regulated pentesting — that need elite consultants and can pay for them.

9. Optiv

9

Optiv

Integrator
Denver, Colorado · ~2,600 employees · Privately held (KKR / PE-backed)
Founded2015 (merger of Accuvant + FishNet)
SpecialtySolutions integration, advisory
PlatformOptiv MXDR, advisory, reseller
TargetUS mid-market to enterprise

Optiv is the largest pure-play cyber services and solutions integrator in the US. The firm is a combined product reseller, managed services provider, and consulting practice, which is both its advantage and its complication. If you want one vendor who can advise you on an architecture, resell the tools, integrate them into your environment, and then run the resulting SOC, Optiv has probably done something very similar five times this year. That's a real value proposition for time-constrained mid-market security leaders.

Optiv's advisory and risk services arm is respected for practical, non-theatrical work — maturity assessments, program design, zero trust roadmaps, and regulatory readiness. Their offensive testing practice is mid-tier: solid, competent, and sufficient for most compliance and enterprise needs, without the research pedigree of NCC Group or the APT-simulation reputation of Mandiant. The MXDR service has grown significantly and is a credible alternative to Deloitte MXDR or pure-play MSSPs.

The caveat with any reseller-plus-consulting firm is channel conflict. The advisor recommending a tool is also incentivized by the margin on that tool. Optiv is not uniquely exposed to this — every integrator lives with it — but buyers should ask explicitly about product neutrality and insist on knowing what independent tool evaluation looks like. For pure consulting without the reseller overlay, independent boutiques are a cleaner choice.

Where Optiv Wins
  • One-vendor cyber solution for US mid-market to enterprise
  • Broad product relationships shorten integration timelines
  • Pragmatic, non-theatrical advisory and maturity work
  • Competent MXDR for organizations that want full-service
Where to Look Elsewhere
  • Channel conflict risk — reseller and advisor roles overlap
  • Offensive testing is solid but not differentiated
  • Limited international presence outside US and Canada
  • Product-sale pressure can bend advice
Best for: US mid-market to enterprise security leaders who want strategy, tools, integration, and run-state under one roof — and can manage channel conflict explicitly.

10. Lorikeet Security


How to Pick — By Company Stage

The firms above are all strong choices in the right context. The wrong context is what causes buyer's remorse. Here is a stage-by-stage decision framework we use with prospects who are deciding between us and one of the other nine firms on this list.

Pre-Seed to Seed

You probably don't need a consulting firm yet. Use free checklists (our pre-seed security guide), a lightweight asset inventory, and focus on not shipping obvious mistakes. When you have a customer asking for a pentest, come back.

Seed to Series A

You need a first real pentest to unlock enterprise sales and compliance. Lorikeet Security, Cobalt, or a strong regional boutique. Do not hire a Big Four firm — you will drown in overhead and the work will not land in engineering.

Series A to Series C

You probably need SOC 2, recurring pentesting, continuous ASM, and a compliance-ready report that ships to enterprise buyers. Lorikeet Security or a focused PTaaS competitor. NCC Group if you have a particularly technical or regulated surface.

Series C to Pre-IPO

You are scaling a program, likely hiring internally, and starting to need specialized pentesting on more surfaces (cloud, mobile, hardware, ICS). Lorikeet Security for run-state PTaaS plus NCC Group or a specialist for specific surfaces.

Public Company / Enterprise

You likely have multiple vendors already. Mandiant for IR and threat intel, one of the Big Four for transformation and privacy, a specialist like NCC for novel surfaces, Optiv or Accenture if you want integrated managed services, and still a nimble PTaaS for ongoing testing between program-scale engagements.

Regulated / Financial Services

A Big Four firm for program and privacy advisory, Mandiant or NCC Group for technical offensive work, and a PTaaS provider for continuous testing. Insist on threat-led frameworks (CBEST, TIBER-EU, iCAST) where regulators require them.


What You'll Actually Pay

Pricing in cybersecurity consulting is opaque by industry tradition, which is itself a red flag. The firms that refuse to share even a range are usually the ones whose pricing varies most — which means similar companies pay very different amounts for similar work. Here is a realistic view of 2026 pricing ranges for the most common engagements, by firm tier.

Engagement Growth-Stage / PTaaS Independent Boutique Big Four / Integrator
Annual web app pentest $7,500 – $20,000 $25,000 – $60,000 $60,000 – $150,000
External network + web combined $12,000 – $30,000 $40,000 – $90,000 $100,000 – $250,000
SOC 2 readiness + pentest $15,000 – $35,000 $50,000 – $120,000 $150,000 – $400,000
Red team engagement $40,000 – $80,000 $100,000 – $350,000 $250,000 – $750,000+
Cyber maturity assessment $15,000 – $40,000 $60,000 – $150,000 $250,000 – $1,000,000+
vCISO / fractional CISO $6,000 – $15,000 / mo $15,000 – $30,000 / mo $50,000+ / mo (rare)
MXDR / managed detection Not typically offered $50,000 – $150,000 / year $300,000 – $2M+ / year
Multi-year transformation Not offered $500K – $2M $2M – $20M+

These are 2026-era ranges we have seen in actual quotes, conversations with buyers, and publicly-reported contract values. Your specific scope will push the number up or down. Two items to flag: first, Big Four and integrator firms almost always have a minimum engagement size, below which they will not take the work — typically $150K for advisory and $60K for pentesting. Second, "retest" is where growth-stage firms consistently beat enterprise firms economically — Lorikeet Security bakes it into scope; a Big Four engagement will often charge for a re-engagement against the same assets at normal rates.


Questions to Ask Any Cybersecurity Consulting Firm

Regardless of which of the ten firms above you shortlist, these are the questions that most reliably separate firms that will do the work well from firms whose sales deck is prettier than their delivery.

  1. Who is actually delivering the work? Ask for bios, resumes, and LinkedIn profiles of the specific people on the engagement. Push back if the response is generic "our senior consultants."
  2. What is your methodology for our specific scope? Have them describe in technical terms what they will do for your environment. Vague answers indicate templated work.
  3. Show me a sanitized sample deliverable. A sample report tells you a lot — is it written for developers, for executives, or neither? Is it generated from a tool, or authored?
  4. What happens if you find a critical vulnerability mid-engagement? You want a clear, named escalation path — not "we'll put it in the final report."
  5. Is remediation retest included, or is it a change order? This is a trap door that consistently surprises buyers. Get it in writing.
  6. What is your cancellation and rescoping policy? Engagements rescope often; you want to know the cost in advance.
  7. How do you handle findings our internal team disputes? A good firm has a formal challenge process. A bad one gets defensive.
  8. Can you give a reference from a company at our stage and in our sector? Enterprise references are not useful if you are a 50-person startup. Insist on relevance.
  9. What is your client retention rate, and how is it measured? High retention with repeat engagements is a strong signal. "Eighteen percent net growth" is not an answer.
  10. What are the limits of your engagement model? Any consultant who says there are none is not being honest.
Watch for these red flags A sales cycle that never involves a senior practitioner. A scope document that doesn't name the deliverable format. A pricing structure that makes it impossible to compare to peers. Refusing to share a sample report. Any consultant who says "we guarantee we'll find vulnerabilities." Any consultant who guarantees they won't. Any consultant who can't tell you how many findings they typically produce per engagement type.

The 2026 Outlook for Cyber Consulting

Three trends are reshaping cybersecurity consulting in 2026, and every firm on this list is positioning for them. Understanding how each firm is adapting will matter more than the list position over the next two years.

AI in the consulting delivery model

Every firm on this list is deploying AI inside their own delivery model — for reporting automation, finding enrichment, evidence correlation, and junior-analyst augmentation. The firms that use AI to make senior practitioners more productive will win; the firms that use it to cheapen delivery at the expense of quality will lose. Lory, our AI security assistant, is Lorikeet Security Security's bet on the former: it handles client-facing questions and surfaces internal knowledge to practitioners, freeing senior testers to focus on the exploitation that only humans do well. Mandiant, NCC Group, and the Big Four are all publicly shipping AI-augmented workflows; the differences in how will define the next generation of consulting.

Compliance convergence and the death of the annual pentest

SOC 2, ISO 27001, PCI DSS, HIPAA, NIS2, DORA, and CMMC are converging on a set of common expectations: continuous control monitoring, documented evidence, and recurring technical testing. The annual "one and done" penetration test is fading in favor of programs that combine continuous ASM, recurring manual testing, and automated compliance evidence. The firms that are structurally set up for this — Lorikeet Security, Cobalt, Synack in pentest; Deloitte and Accenture in MDR — are investing; the firms that still sell point-in-time engagements as their core motion will find themselves losing to buyers who want a program, not a project.

The growth-stage segment is no longer under-served

Ten years ago, a Series A SaaS company had exactly two options for cybersecurity consulting: pay Big Four rates for work mis-sized to their business, or hire a solo consultant from LinkedIn and hope. That is no longer true. The growth-stage segment is now served by a handful of challenger firms (including us) and an expanding set of PTaaS platforms. This segment will continue to fragment and mature through 2026 and 2027, and the firms that stick to a clear positioning for this buyer will be the ones that survive the shakeout.


Final Take

A "top 10" list is inherently reductive — what really matters is the match between your situation and the firm's operating model. The Big Four will beat a challenger for a $10M multi-country transformation program. A challenger will beat the Big Four for a $15K SaaS pentest that needs to ship in three weeks. Mandiant will beat everyone for post-breach IR on a sophisticated intrusion. NCC Group will beat everyone for cryptographic review. Lorikeet Security will beat everyone at making a growth-stage company's SOC 2 pentest actually get used by the engineering team.

The question is not which firm is "best." The question is which firm is built to do your specific work well. Pick the firm whose core business is delivering the thing you need, not a firm whose core business is something else and who will deliver your thing as a secondary concern.

If you are a growth-stage SaaS company thinking about penetration testing, continuous ASM, or a SOC 2 pentest + readiness package, we would welcome a conversation — even if the answer is that we are not the right fit. We will tell you so, and point you at a firm on this list that is. That is the kind of cyber consulting relationship we want to build.

See Whether We Fit Your Situation

Thirty-minute scoping call with a senior practitioner, not a sales rep. We'll look at what you actually need and tell you — honestly — whether Lorikeet Security is the right call or whether a firm on this list is a better fit for your stage and risk.

Book a Scoping Call
-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!