StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Roles and Contribution Job Position under the Australian Security - Term Paper Example

Cite this document
Summary
From the paper "Roles and Contribution Job Position under the Australian Security" it is clear that the recruitment process for these job positions is quite choosey with priority only being given to the candidates with the particular qualification required for the job positions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful

Extract of sample "Roles and Contribution Job Position under the Australian Security"

SECURITY FOUNDATIONS Name of Student Institution affiliation SECURITY FOUNDATIONS The security body is a quite diverse and broad body within any government both globally and In Australia specifically. Therefore, the security body is divided into various domains which are occupied by various employees with different skill set and knowledge. Analysing these specific job positions of the individuals working under different security domain will give us a better understanding of Australian security body and its roles to the public. This also helps us break down the different bodies within the security domain and their role and contribution to the security domain in general. On the other hand, this analysis will also help us understand the rank role in each of these job positions and their benefits. This paper, therefore, highlights on significant job position under the Australian security domain and tries to spell out their roles and contribution towards the attainment of security globally. Compliance and Risk Management Advisor The job classification for this particular job position under the Australian security domain is EL1. The job salary ranges between $95,481 and $115,790 including the superannuation. The security clearance level for the job position is negative vetting 1. The major task allocated to the Compliance and Risk Management Advisor ( CARMA) is providing Work Health and Safety, Protective Security, and risk management, briefs the Gallery Director by reporting to the CFO (Danicic, M. &Maksimovic, G. 2014). On the other hand the role of the Compliance and Risk Management Advisor (CARMA) provision of a safe environment for the building occupants. He is therefore tasked with using his risk based skills to research and implement various security measures in managing the Gallery’s risk. Compliance and Risk Management Advisor (CARMA) is also tasked with carrying out assessments on the possible security risks and site surveys. Workers through conducting WHS risk assessments (Steinfeld, J., McCue, C., & Prier, E. 2016). Security Manager The job level for this position within the Australian security job division is Executive Level 1.The salary ranges between $96,084to $108,382superannuation. AnEL1SecurityManager is tasked with being accountable to carry out complex security protection tasks. These employees are flexible to work on the established principle, legislation framework and with the objective of security defence. These individuals have a vast knowledge of protective security and ability to perform in the integrated workforce (Katsimi, M. 2008). These people are also required to be independent and have good leadership skills due to the nature of their work. In this line of work, they are bound to engage in difficult tasks involving security and operational outcomes for defence. They are also required to have the ability to manage, plan and carry out a particular task as required (Danicic, M. &Maksimovic, G. 2014). . Senior VP, Head of Security Management This job position entails management of security team and security function in a corporate organization. The individual to take up this particular job position should be ready to enforce the security management frameworks within the corporate organization. This individual has to be very observant and keen to small details since they will be expected to notice every security threats that the corporate might be facing (Farr, J. &Shatkin, L. 2009). He should also be computer and technology savvy since the corporate will have technologically sophisticated devices that help in detecting any security threat. He will also be in charge of day to day running of the corporate security framework of the corporate. He will also be involved in the security policy making process where he will be consulted due to his vast skills in security. He is also responsible for updating the employees on various security updates concerning the corporate or bank. Security specialist This particular job position requires one to offer security consultancy services. These individuals are also involved in giving expertise advice concerning the physical and electronic system designs to potential clients globally. The individual to take up this position must be of great character and highly influential since they will be required to engage with the existing and new clients (Mouratidis, H., Jahankhani, H., &Nkhoma, M. 2008). On the other hand, he is also required to have good communication skills since he will be in constant communication with these clients (Forte, D. (2009). This job position also requires an individual who extremely cautious to small details since they will be required to create projects scopes in the preparation of client’s proposal fee. In this line of work, one is required to have a ten years work experience in order to secure this job position. Physical Security Specialist The Physical Security Specialists in charge of a couple of specialized duties which are dedicated to a Security program. Some of these duties include; formulation of security procedures and policies, physical security management, fire system management, security system contacts management and conductive sensitive security investigation. This, therefore, means that for an individual to qualify for this job position they have to be flexible and willing to adapt to change due to the multiple intergradations of tasks involved in this job position (Tonra, B. 2011). Vocational education is also a must have in this particular job position. On the other hand, one is required to have six-year experience in this line of work. One is also required to have a Professional Physical Security certificate obtained in time duration of twelve months PSP certification are also given a higher priority in the recruitment process for this particular job position. Thematic analysis Becoming familiar with the data Evidently each job role under the security domain has different qualification skill and education levels. However, there are some common skills that are requirements in most of these job roles. Flexibility and good communication skills are some of this are standard skills which are requirement in all these job roles. This emphasizes how these skills are important in the job market making them standard skills for qualification for any job position in under the Australian security domain (Mouratidis, H., Jahankhani, H., &Nkhoma, M. 2008). Education is also a significant requirement for all these job roles with some demanding an advanced degree for one to secure these job positions. Being computer savvy and one being fascinated with technology is also a key ability required for these positions which fall under the Australian security domain. This is because most entail being in contact with video surveillance, level access control, and sophisticated fire alarm system (Danicic, M. &Maksimovic, G. 2014). In line with this, one has also to be in possession of AMAG Technology professional certification and GSI Video Surveillance Systems in most of these job positions (Ruengsrichaiya, K. 2006). Also for one to qualify for majority of these job positions they are required to have already passed the NERCCIP Personnel Risk Assessment (PRA). On the other hand most of these jobs require one to have the Burglar Alarm/Fire Alarm System Agent (BASA/FAS) Certification (Shi, L. 2006). However, this has to have been obtained in time duration of one year while they are in active employment. Generating Initial codes It was notable that these jobs under the Australian security domain require an individual with a particular skill set. This can be attributed to the complexity in which these job positions relate to therefore one has to be equipped with particular skills to carry out this job effectively. Education was evidently seen is a mandatory requirement in securing this job positions. On the other hand communication skills and good work ethics were important attributes required from these individuals. These job positions also require an individual who will supervise, manage, and motivate security team members with the focus on fostering their development. In this case, these positions require one to have a particular set of skills and attributes (Williams, R. 2002). They also require professionalism where one ensures that the security team is operating in line with the set policies, and the compliance requirements of the employees are met. Due to the notable complexity of work required by the individual to take up these particular job positions; one requires a certain number of years of experience in order to qualify. Specifically, these years of experience have to be gained in Australian security Industry (Security job descriptions in disarray 2002). Searching for themes Analysing the five job description that relates to Australian security domain one will notice a particular pattern in them. First, the qualification procedure is quite choosy with great emphasis being put on required skills and a number of experience years in this line of work. (Mouratidis, H., Jahankhani, H., &Nkhoma, M. 2008) .This further reveals the complexity of these job positions with some demanding as much as 15 years of experience. Education was also a common requirement for these job positions. Being a time work players, was one of the common skill requirement for these job position together with leadership skills, good communication and flexibility to adapt to change (Miller, G 2005). Reviewing the themes A review of these requirements for this job position shows how delicate and complex these security domain job positions are. Due to their interrelation with the public and other parties security climbed the rank to be a fundamental priority in recruitment to this job position (Lian, S., Sun, J., & Wang, Z. 2005). In line with this being a team player which involves working and integrating perfectly with colleagues was also a prioritized ability in recruitment to these job positions. The other theme noted in these job positions is compliance with the organizations rules, and policy. This therefore spells out that these job positions require a particular level of discipline from an individual. Interpersonal skill is another theme noted in reviewing these job descriptions. Since leadership skill are require in all these job position one is required to have a charismatic and influential character in order to foster relationships with colleagues, superiors and juniors (Mouratidis, H., Jahankhani, H., &Nkhoma, M. 2008). On the other hand organizational ability and good work ethics are required in all these line of work. These are two noted attributes in most of the recruitment requirement of these jobs (Security job descriptions in disarray 2002)..Besides the ability to read and write most of these job positions also require individuals who are good in reading, understanding and interpreting numerical data. This is due to the frequent workplace reviews which they constant in most of this line of work (Security job descriptions in disarray 2002). Defining and naming themes Communication skills: ability to talk eloquently and write perfectly for another party to understand. Being a team player: the ability for one to work with other perfectly, forming good relationships that boost their productivity. Vocational education: education that one learns or goes through in order to prepare them to work in a particular job position. Flexibility: The ability for one to carry out different tasks some which they may not be perfectly trained in. Adaptability to change: the ability for one to one to fit in new circumstances; this is a key to flexibility at the workplace. Producing the report Evidently seen these are some of the basic requirements in these particular job positions that stretch across the general hiring requirements in security job positions. However, most of these skill set required for these particular job position can be learned. The years of experiences in this job position reveals how delicate a particular job position is and the complexity of the job itself. On the other hand, this is revealed by the multiple job qualification requirements which portray the picture that in the recruitment process in these job positions is extremely choosy (Security job descriptions in disarray 2002). Discussion This means that the employment domain of security in Australia will go for the best skilled, highly qualified and the candidate with the required years of experience to fill these job positions. However, questions arise due to the recruitment process for these job positions which have been termed as quite choosy (Le Grand, C. 2013). This has made it tough for these job positions to be filled due to the fact that it is very rare to find individuals with these skill set, qualifications and years of experience to fill these job opportunity. On the other and the recruitment process guarantees these job positions will be filled with the best fit individuals capable of carrying out assigned tasks perfectly (Security job descriptions in disarray 2002). The work values, skill set, vocational education and employee’s ability required in this job positions ensure that only the best-fit candidates are able to qualify for this line of work (Preston, M. 2015). Time consciousness is also another fundamental must have skill in these jobs. This is due to the fact that most of these job roles entail managerial skill. In this case leadership skills are also key must-have skills. On the other hand, the benefits and type of work in these job positions also suggest that these jobs are quite secure and remunerative for the employees who qualify for them (Mouratidis, H., Jahankhani, H., &Nkhoma, M. 2008). The qualification and recruitment process for these jobs also suggest that these jobs require a certain level of professionalism. In this case a candidate should have they require vocational education, skill set, years of experience and abilities required for them to secure these job positions(Security job descriptions in disarray 2002). On the other hand judging by the salary in these job positions we can claims that they provide economic security and a decent standard of living to the candidates who attain them. Conclusion In the analysis, it was notable that these particular job positions in the Australian security domain require a particular skill set, vocational education and employee’s ability. It is also notable that the recruitment process for these job positions are quite choosey with priority only being given to the candidates with the particular qualification required for the job positions. The roles and contribution of these job positions towards the attainment of security globally has also been highlighted trough an in-depth look into these job descriptions. On the other hand, good communication skills, flexibility at the workplace, ability to adapt to change, and ability to be keen to fine details are some of the stand out requirement for these job positions. References Danicic, M. &Maksimovic, G. (2014).Profiling of security manager for crisis management.Bezbednost, Beograd, 56(1), 41-56. http://dx.doi.org/10.5937/bezbednost1401041d Forte, D. (2009).The role of the Information Security Manager in cutting-edge companies.Network Security, 2009(8), 4-5. http://dx.doi.org/10.1016/s1353-4858(09)70073-x Glasius, M. (2008). Human Security from Paradigm Shift to Operationalization: Job Description for a Human Security Worker. Security Dialogue, 39(1), 31-54. http://dx.doi.org/10.1177/0967010607086822 Le Grand, C. (2013). Positive Security, Risk Management, and Compliance.EDPACS, 47(4), 1-10. http://dx.doi.org/10.1080/07366981.2013.775792 Lian, S., Sun, J., & Wang, Z. (2005).Security analysis of a chaos-based image encryption algorithm.Physica A: Statistical Mechanics And Its Applications, 351(2-4), 645-661. http://dx.doi.org/10.1016/j.physa.2005.01.001 Miller, G. The Role of Risk Management and Compliance in Banking Integration.SSRN Electronic Journal.http://dx.doi.org/10.2139/ssrn.2527222 Mouratidis, H., Jahankhani, H., &Nkhoma, M. (2008). Management versus security specialists: an empirical study on security related perceptions. Info Mngmnt& Comp Security, 16(2), 187-205. http://dx.doi.org/10.1108/09685220810879645 Preston, M. (2015). Case manager job strain in public child welfare agencies: Job demands and job control's additive effects, and instrumental feedback's mediating role. Children And Youth Services Review, 54, 30-40. http://dx.doi.org/10.1016/j.childyouth.2015.04.010 Ruengsrichaiya, K. Internal Governance, Security Price and Firm Dynamics.SSRN Electronic Journal.http://dx.doi.org/10.2139/ssrn.2016107 Security job descriptions in disarray.(2002). Network Security, 2002(8), 2.http://dx.doi.org/10.1016/s1353-4858(02)08002-9 Shi, L. (2006). Does security transaction volume–price behavior resemble a probability wave?.Physica A: Statistical Mechanics And Its Applications, 366, 419-436. http://dx.doi.org/10.1016/j.physa.2005.10.016 Tonra, B. (2011). European Union security dynamics: in the new national interest. European Security, 20(4), 608-610. http://dx.doi.org/10.1080/09662839.2010.528405 Williams, R. (2002). Development agencies and security-sector restructuring.Conflict, Security & Development, 2(01), 145-149. http://dx.doi.org/10.1080/14678800200590603 Farr, J. &Shatkin, L. (2009).Best jobs for the 21st century. Indianapolis, IN: JIST Works. Giloth, R. (1998). Jobs & economic development. Thousand Oaks, Calif.: Sage Publications. Kang, Y. &Ritzhaupt, A. (2015). A Job Announcement Analysis of Educational Technology Professional Positions: Knowledge, Skills, and Abilities. Journal Of Educational Technology Systems, 43(3), 231-256. http://dx.doi.org/10.1177/0047239515570572 Katsimi, M. (2008).TRAINING, JOB SECURITY AND INCENTIVE WAGES.Scottish Journal Of Political Economy, 55(1), 67-78. http://dx.doi.org/10.1111/j.1467-9485.2008.00442.x Paulsen, R. (1988). Design of an Officer Assignment and Career Planning Decision Support System for Electronic Security Command. Ft. Belvoir: Defense Technical Information Center. Steinfeld, J., McCue, C., & Prier, E. (2016).Examining professionalisation in public procurement by ranking practitioner job positions according to job activities.IJPM, 9(3), 328.http://dx.doi.org/10.1504/ijpm.2016.076308 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Roles and Contribution Job Position under the Australian Security Term Paper, n.d.)
Roles and Contribution Job Position under the Australian Security Term Paper. https://studentshare.org/human-resources/2066993-security-foundations-2
(Roles and Contribution Job Position under the Australian Security Term Paper)
Roles and Contribution Job Position under the Australian Security Term Paper. https://studentshare.org/human-resources/2066993-security-foundations-2.
“Roles and Contribution Job Position under the Australian Security Term Paper”. https://studentshare.org/human-resources/2066993-security-foundations-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Roles and Contribution Job Position under the Australian Security

How Is the Employment Relationship in Australia Changing

In the past existed a tradition of centralized regulations of wage rates and working conditions through the granting of awards and various other agreements by the australian Industrial Relations Commission was permitted through the industry as well as national level.... under the new collation government reforms were bought through a more unilateral recommendations then collaborations with workers and their unions.... In additions works feel stress level rising as they are being overworked and due to a reduction in job security....
8 Pages (2000 words) Essay

Contradictions in Australian Economic Co-operation

The paper suggests that the establishment lacks confidence in the strengths of the australian economy.... The paper 'Contradictions in australian Economic Co-operation' focuses on Australia which has changed substantially in modern times from the inward-looking and highly natural resource-oriented economy which it once was.... Hence the exaggerated and coordinated genuflection of australian politicians, both in and out of power, to meet the alleged expectations of the present regime which rules China, with respect to the isolation of the Dalai Lama....
13 Pages (3250 words) Case Study

The Media Language of War

he investigators recommended that the UN security Council require Israel to launch its own credible investigation into the conflict within three months.... The author of the current article claims that a UN investigation has concluded that both sides in the Israeli-Palestinian conflict in Gaza committed war crimes and possible crimes against humanity, raising the prospect that officials may seek prosecution in the International Criminal Court....
13 Pages (3250 words) Article

Australian Women Workforce Participation and Childcare from birth to 5

Overly, there are better potentials for women now, but there are still respectively fewer females in key sites in the australian workforce (Skinner, Hutchinson, Pocock, Formerly developing from feminine labor movements in North America & Europe, female involvement in politics and the labor force provides a great emphasis of IWD (Council of Australian Governments, 2013).... The literature review seeks to review current female participation in the australian workforce....
20 Pages (5000 words) Essay

Human Resource Management Practices in Qantas

Providentially, the fall down of Ansett that halted domestic opposition in the australian airline industry that had lowered the behest price war for customer finances, lessened the waft on September 12, 2001(www.... For instance: Against a backdrop in the precedent decade of major related changes, together with the airline deregulation, the joining of australian Airlines and privatization of Qantas, Qantas has undergone major directorial change (Jenkins, D.... This loom was obtained from Taylor's view and the way of motivating the workers' approach was derived from McGregor's theory X which had less impact under certain situation....
14 Pages (3500 words) Research Paper

Exploring Linkages between National Culture

As such, there is not much information or comparison between the Saudi Arabian culture and the australian culture.... At the height of globalization, it is quite possible that managers of australian origin would be appointed to head departments in the hospitality industry located in Saudi Arabia.... Most specifically, the research seeks to establish if indeed a manager of australian origin can be assimilated to perform his duties effectively in Saudi Arabia and vice versa....
13 Pages (3250 words) Research Proposal

The Australian Carbon Scheme and the Accounting systems

The paper "the australian Carbon Scheme and the Accounting systems" is a great example of a literature review on finance and accounting.... the australian carbon scheme has had a massive debate in the australian parliament over some years and it has been failing until late 2010.... The paper "the australian Carbon Scheme and the Accounting systems" is a great example of a literature review on finance and accounting.... the australian carbon scheme has had a massive debate in the australian parliament over some years and it has been failing until late 2010....
12 Pages (3000 words) Literature review

Cyber Ethics for Business

The paper "Cyber Ethics for Business" is an outstanding example of an information technology essay.... This research work deals with issues concerning cyber ethics pertaining to businesses, as well as individuals.... In the present global era, cybersecurity is of great importance for businesses and individuals....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us