StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Basic Specifications for Security Jobs - Report Example

Summary
The paper "The Basic Specifications for Security Jobs" is a great example of a report on management. The security industry is experiencing tremendous growth. Stiennon (2013) predicted that the industry could increase ten times within years…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful

Extract of sample "The Basic Specifications for Security Jobs"

Security Jobs Name Institution Security Jobs The security industry is experiencing tremendous growth. Stiennon (2013) predicted that the industry could increase ten times within years. One can attribute the growth rate to the increase in crime rates and the advancement of technology within the industry. The commercial, government, and non-profit organizations require both physical and data protection to improve the safety and security of individuals and sensitive information. The expanding industry presents numerous opportunities with varying responsibilities and requirements. This report targets at finding out the minimum qualifications for a person whose intent is taking a security job. These requirements are usually traceable in most of the security job posts. This research work starts by evaluating available job positions and their respective job descriptions. It then identifies the attributes, skills, and knowledge required for handling the tasks, and then compares and contrasts these requirements. Eventually, it determines the basic specifications for security jobs. Analysis of Job Descriptions Job description is a statement that indicates the requirements an employee should meet to handle duties and responsibilities assigned to the position (Schambers, 2015). The necessities that are outlined are mainly in three categories, which are the essential skills, attributes, and knowledge (Doyle, 2016). The skills refer to the expertise one holds that could increase the effectiveness and efficiency of handling the necessary activities. They include management skills and analytical skills. The second requirement is 'attributes'. While skills refer to the competencies that one learns from the environment, attributes are the natural talents and the innate personalities that people have. Examples of attributes are being self-driven and being a team player. Similar to the skills, they increase the ease of handling tasks. Thirdly, the knowledge necessities entail the understanding that one has concerning the concepts, duties, and responsibilities of the job position. It is usually evidenced by the course one pursues and experience in handling similar responsibilities and tasks. Job postings usually indicate the minimum requirements of skills, attributes, and knowledge (Mangaleswaran & Kirushanthan, 2015). Job Description One One of the available security job positions is in Jones Lang LaSalle. The firm has a vacant position of a security manager. The personnel will be in charge of managing the Dumas House security and ensuring that the occupants are safe and secure (JLL, 2017). The applicants of this job post should be holders of a bachelor's degree in any field. They should also have strategic management skills, the risk analytical skills, and the security management skills. Additionally, the position's responsibilities require the manager to be a team player, adhere to the set rules, be keen to details, and be a critical thinker. Job Description Two There is also a security position in the Australian Fisheries Management Activity (AFMA). The organization seeks for a VMS officer, who will be providing strategy and intelligence that will be supporting the available risk programs and participate in both in-field operations and investigations (Australian Fisheries Management Authority, 2017). The person should be conversant with the purpose and goals of AFMA and the health and safety provisions of the firm. The applicant should be a team player, self-driven, strategic thinkers, have the ability to conducts operations professionally, be tolerant of diversity, and have high standards of integrity. The skills that the office should possess are interpersonal, communication, strategic, and negotiation skills. Job Description Three ASIO has an open position of a technical security countermeasures officer. The applicant should at least be a holder of a certificate in electronics or electromechanical engineering (ASIO, 2017). The personnel should be knowledgeable about the technology that is incorporated in security measures, the principles of cyber security, and the building management systems. Additionally, the position requires that the employee have an understanding of the maintenance of security systems, emergency building services, and radio frequency communications. The officer is required to have technical, analytical, interpersonal, and teaching skills. Moreover, he or she should be self-driven, a team player, and have a resourceful approach to raising problems within the area of expertise. Job Description Four Another available vacancy is the position of a protective security officer in the Department of Industry, Innovation, and Science. The holder of this post requires should be knowledgeable in protective security, legislation regarding protective security, the requirements of working in a classified environment and have experience in protective security (Department of Industry, Innovation and Science, 2017). The responsibilities that the holder of the position will have further requires the applicant to have interpersonal skills, supervisory skills, training skills, security management skills, communication skills and accounting skills. The attributes required to handle the responsibilities of the holder of this position include secretive, keen on details, self-drive, team player, and intelligent. Job Description Five There is also a job opening in Griffith University for the position of a security and traffic manager. This job opening requires the applicant to have skills such as managerial skills, security management skills, strategic management skills, communication skills, problem-solving skills and analytical skills. The knowledge required to complete the responsibilities of a security and traffic manager at Griffith University, on the other hand, include knowledge of security and parking processes, installation of security systems, and knowledge to use security related software (Griffith University, 2017). The attributes required for this job include being a team player, achiever, analytical thinker, and strategic thinker. Findings and Thematic Analysis Findings JD1 JD2 JD3 JD4 JD5 Sector Commercial Government Government Government Government Attributes Keen on details Team player Critical thinker Observer of rules Strategic thinker Team player Professionalism Self-drive Integrity Achiever Diversity tolerance Resourceful thinker Self-drive Team player Team player Intelligent Self-drive Keen on details Secretive Team player Achiever Strategic thinker Analytical thinker Skills Strategic management skills Risk analysis skills Security management skills Strategic management skills Interpersonal skills Communication skills Negotiation skills Interpersonal skills Communication skills Teaching skills Analytical skills Communication skills Accounting skills Interpersonal skills Supervisory skills Training skills Security management skills Problem-solving skills Communication skills Managerial skills Interpersonal skills Analytical skills Security management Strategic management skills Knowledge Security measures Bachelor’s degree AFMA’s purpose and goals AFMA’s cultures AFMA’s health and safety principles Security measures Cyber security principles Building management systems Emergency building service Radio frequency communications Maintenance of security systems Protective security Legislation of protective security Requirements of working in a protective environment Experience in protective security Security software Security processes Parking processes Security system installation and maintenance Thematic Analysis According to the data collected, the most common attribute is being a team player since it is a requirement in all the five jobs. The second most common attribute in the analysed job positions is an analytical thinker, which is in some cases referred to as critical thinker, resourceful thinker or strategic thinker. It is a requirement in four of the job vacancies. The third most common attribute is self-drive since it is required in three of the job positions. The ability to be keen on details and being an achiever are the fourth most common attributes since two of the positions analysed have it as part of the requirements. The rest of the attributes are specific to a particular job position. The most common skills, on the other hand, are communication skills, and interpersonal skills, which are a requirement in four of the jobs. Strategic management skills, analytical skills, security management skills are the second most essential skills according to the data since they are a requirement in three of the available job positions. Training skills are required in two of the five job posts. The remaining skills are required in specific jobs alone. The knowledge requirements in contrast hardly have anything in common. Most of the requirements in all the examined job positions are different from each other. There is only one common aspect, which is knowledge in security measures or processes. Frequency Requirements 5 Security measures, team player 4 analytical thinker, communication skills, interpersonal skills 3 self-drive, strategic management skills, analytical skills, security management skills 2 Keen on details, achiever, training skills, security system installation, and maintenance 1 AFMA’s purpose and goals, AFMA’s cultures, AFMA’s health and safety principles, security software, security processes, parking processes, cyber security principles, building management systems, emergency building service, radio frequency communications, protective security, legislation of protective security, requirements of working in a protective environment, experience in protective security, negotiation skills, teaching skills, supervisory skills, accounting skills, problem solving skills, integrity, diversity tolerance, observer of rules, secretive, intelligent Discussion Skills and attributes are the most commonly shared requirements in security jobs. Security jobs require one to have deep knowledge in security measures, good communication skills, interpersonal skills, analytical skills, strategic management skills and security management skills. Most of the knowledge required to complete tasks in the companies, however, is different since the tasks being handled are different (Torpey, 2015). The difference in the industries that each of the company operates also contributes to the difference in most of the knowledge and skill requirements (US Department of Labor, 2009). The objectives of the companies also determine the job details and specifications. The objectives of each of the five companies are different. This accounts for the difference in the knowledge and skill requirements since different activities require to be done to achieve the different goals (US Bureau of Labor Statistics, 2011). For example, the goals in ASIO are distinct from the goals in Jones Lang LaSalle. They, therefore, engage in diverse activities to achieve their various company goals. Conclusion In conclusion, individuals interested in pursuing a career in security industry should work to ascertain that they have some common skills. These core competencies include excellent communication skills, interpersonal skills, analytical skills, strategic management skills and security management skills. They should also determine the particular industry that they wish to work to enable them to sharpen their abilities further. Doing these things would increase their competitiveness and increase their chances of getting the jobs of their dream. References Top of Form Top of Form Arun, K., & Meenakashi, N. (2009). Organizational behaviour, a modern approach. New Delhi: Vikas Pub. House Pvt. Ltd. ASIO. (2017). Technical security – countermeasures (TSCM) officer. Australian Fisheries Management Authority. (2017). APS 5: VMS officer. Deb, T. (2006). Strategic approach to human resource management: Concept, tools and application. New Delhi: Atlantic.Bottom of Form Department of Industry, Innovation and Science. (2017). Current vacancies: Protective security officer, APS level6, digital strategy & operations. Doyle, A. (2016). What are job requirements? Retrieved from https://www.thebalance.com/what-are-job-requirements-3928054 Griffith University. (2017). Manager, security and traffic. JLL. (2017). Precinct security manager. Mader-Clark, M. (2013). The job description handbook. Berkeley, CA: Nolo. Mangaleswaran, T. & Kirushanthan, K. (2015). Job description and job specification: A study of selected organizations in Sri Lanka. International Journal of Information Technology and Business Management, 41(1), 30-36. Schambers, A. (2015). Job descriptions: The foundation of human resources. Retrieved from http://www.grbj.com/articles/83063-job-descriptions-the-foundation-of-human-resources Stiennon, R. (2013). It security industry to expand tenfold. Retrieved from https://www.forbes.com/sites/richardstiennon/2013/08/14/it-security-industry-to-expand-tenfold/#1ca2f00c12ed Torpey, E. (2015). Same occupation, different pay: How wages vary. Retrieved from https://www.bls.gov/careeroutlook/2015/article/wage-differences.htm US Bureau of Labor Statistics. (2011). The big book of jobs. New York: McGraw-Hill. US Department of Labor. (2009). Occupational outlook handbook. New York: Skyhorse Publishing. Read More

CHECK THESE SAMPLES OF The Basic Specifications for Security Jobs

Network Administration Capstone Project

What is more, it was to ensure that the system specifications were working as planned.... Ths report "Network Administration Capstone Project" analyzes the components and features of the software in relation to the demands of the department.... The result of the component and system analysis is what has been presented in this capstone project....
22 Pages (5500 words) Report

IT Managers Plan for the Provision of IT Facilities

In this scenario, the effective planning is basic need for the establishment of this new department at our university.... IT Manager's Plan for the provision of IT facilities to the new department of Computer Science Name Date Table of Contents 1- ABSTRACT Successful project management is a key to success of a project....
17 Pages (4250 words) Essay

Recuitment & selectionCMI LEVEL 3 DiPLOMA

8 Pages (2000 words) Assignment

Data Security Policy and Effective W5 Security System

The data and information security risk can be illustrated as the intensity of its effect on organization activities (including operational jobs, illustrations, or status), organization assets, or on individual and/or financial information collected during the process of entering into business information arrangements.... The following pages present an analysis of Data security Policy and comprise detailed analysis and recommendations regarding the improvements to our department's data security policy....
5 Pages (1250 words) Essay

Interesting Vacancy Specifications

Other than that, the only indication of who would be suitable for the role is those who 'have Security Clearance at least at the basic Level – BPSS' (Computer weekly.... om jobs, 2009).... This essay "Interesting Vacancy specifications" presents a description of the vacancy that I applied for was its vagueness....
2 Pages (500 words) Essay

The Majority of the IT Jobs

From the paper "The Majority of the IT jobs " it is clear that the I.... technical support officer is very important in any organization and these are among the jobs that fit appropriately to my level of qualifications and skills.... In clinics or hospitals, for example, the information of the patient will in most cases be recorded in the database, whilst private organizations will most likely store the sales record, the details of the customer and more (Total jobs, 2015)....
14 Pages (3500 words) Coursework

Similarities and Differences between the American and British Policing Systems

The police force has a role in fighting crime and implementing security policies.... The American and British police department allow the security department to conduct police vacancy advertisements.... The paper 'Similarities and Differences between the American and British Policing Systems' seeks to dig out the reasons of the fall in popularity of policemen in the United States due to which minority representatives are hired, while in the UK the prestige of the profession is still high....
14 Pages (3500 words) Research Paper

Security Foundation

And how these two jobs are related to security theory and general academic characteristics (William, 2005).... The analysis of these two jobs will include micro-focus that highlights the two positions and macro-level analysis indicating similarities and differences for the two positions.... ryptography jobs entail analyze and decipher encrypted data to assist the government (National Institute of Standards and Technology, 2011), businesses, or law enforcement officers in solving threats, crime, or security concerns (Satoh and Araki, 2006)....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us