StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Analysis of Five Security-Related Job Titles - Term Paper Example

Cite this document
Summary
The paper "Analysis of Five Security-Related Job Titles" discusses that working as a team member is a must in security jobs as one has to corporate both with his fellow workers as well as other stakeholders. This is the essence of communication skills and interpersonal skills requirements…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful

Extract of sample "Analysis of Five Security-Related Job Titles"

Table of Contents Introduction 1 Analysis of job description 2 Senior VP, Head of Security Management-Corporate Banking 2 Security specialist Jacobs 2 Physical Security Specialist 3 DOD Security manager 3 Compliance and Risk Management Advisor 3 Content and Thematic Analysis 4 Knowledge, skills and attributes for the jobs 5 The overarching themes 7 Similarities 7 Differences: 7 Discussion 8 Conclusion 8 References: 9 Introduction The security domain is broad, as security in terms of the means through which society pursues a state of wellbeing is diverse, both in Australia and at a global level. Therefore, different areas of interest within the security domain require different knowledge, skill and individual attributes. Security does not only involve the security of property and people as many may think. It involves complex issues ranging from the physical security of people and property, such issues as cyber security, work health and safety issues, national security, security management among other areas. All these areas of the security domain have many similarities as will be observed below. At the same time, differences exist depending on the type and level of security in question. This paper analyses five security related job titles with an aim of establishing their similarities and differences. This will form the basis of discussion and conclusion on the state and nature of jobs in the security domain. Analysis of job description Senior VP, Head of Security Management-Corporate Banking Generally, the job will involve the day to day running of the security management department, policy development as well as security employees’ management and development. Specific roles will include the management of the day to day managing of the security management function and development of policies and processes for supporting security management function while militating against operational and security risks. Embedding the security management processes and policies and keeping the bank at par with current developments in the sector (Sennewald, 2003). The role includes educating, managing, supervising and motivating new and existing employees while monitoring their performance and providing feedback and development. Security specialist Jacobs The security specialist’s role will include working as part of a local and national security consulting team on various projects. This will include providing specialist electronic and physical security systems design while giving related advice to existing and new clients across all market sectors. The person will actively assist in growing the security team through positively engaging with new and existing clients (Stephen, 2009). Another role will be accurately determining and documenting project scope when preparing client fee proposals while managing time and cost control in ensuring projects are delivered within the budget. Physical Security Specialist The person will be responsible for formulation of security policies and procedures, budgetary management and controls, physical security and fire system project management. The person will be responsible for administration of security system contracts and security system support for sensitive investigations as well as security program education and training (Fay, 2010). The job is responsible for continued development, functionality and longevity of the company’s physical security/fire systems that provide security and safety for the company’s personnel and assets among other security related roles. DOD Security manager The job will involve leading the team, management of allocated resources, planning work area priorities and managing workflows, development of strategies and evaluation of business outcomes. The manager is accountable for accurate work completion, educating, monitoring and guiding the less experienced employees. The manager will lead and manage provision of protective security advice to stakeholders in supporting implementation of security policies, procedures and practices. He will ensure development, implementation and monitoring assurance programs completion and providing advice on the emerging protective security matters. The person will foster productive relationships while influencing, mentoring and guiding team members and effectively communicating to various stakeholders. Compliance and Risk Management Advisor Roles include managing and maintaining a safe and secure environment for the Gallery’s property and members, research, development, implementation and review of related security procedures for managing Gallery’s risk (Chen, 2006). The position also involves managing the Gallery’s WHS management system while developing related strategies while educating staff. Gallery risk management and inculcating a risk awareness culture among stakeholders and developing Gallery’s risk management strategies and policies and managing Gallery business continuity planning and emergency management and related strategies. The person oversees the implementation and reporting on a fraud prevention and control while monitoring and analyzing security, WHS and risk management industry development and trends. Content and Thematic Analysis For one to qualify for a certain jobs, there are various requirements that employers look for. For instance, there is a certain level of knowledge or training those applicants in the above job positions are required to have if they are to qualify for the jobs. Other requirements for one to qualify for the jobs may include experience in similar positions. These requirements by employers can be summarized into knowledge, skills and graduate attributes (KSA). Stephen (2009) refers to them as evaluation factors on the basis of which the person qualifying for the job is evaluated. The factors are related to the job description in that they indicate what the candidate should have so as to be able to perform the job roles identified. For instance, a security specialist may require some training in cyber security if his job description involves detecting and preventing cybercrime. Lauby (2016) defines knowledge as the theoretical or practical understanding of what the job in question is all about. For instance, people working in the security management levels are required to have general knowledge of the trends in the security sector. According to Barrie (2004), skills include the practical or theoretical understanding of the job in question. Skills are learned and may specifically relate to the job being applied for. For instance, a security analyst is generally required to have firewall and intrusion detection and prevention skills. On the other hand, attributes refer to being able to do the particular job and may include the acquired skills and knowledge. They are also dependent on experience and would help one perform the job as required. Knowledge, skills and attributes for the jobs The overarching themes There are some thematic similarities and differences across all the above positions regarding the graduate attributes, core knowledge and skills above. These are outlined below; Similarities i) The level of education and training-though the level of education and training qualification levels vary from diploma to degree level, all the above positions require a certain level of education and training in the relevant field. ii) Experience- Though the years of experience vary across the above jobs, all the jobs require a certain level of experience in the relevant fields. iii) Management knowledge and skills- All the position require a certain level of team management knowledge and skills depending on the level of management the job is. For instance, the VP security position requires ability to manage the team while the security analyst position requires ability to manage budgets. iv) Communication and interpersonal skills- All the positions require certain level of communication and interpersonal skills for one to be able to communicate with various stakeholders. v) Management of risk- all the jobs requires some level of ability to identify and resolve security management and security risks in the relevant fields. vi) The jobs require one to be abreast with market developments in security and security management best practices. Differences: i) Certification- some of the jobs require a number of professional certifications on security matters while others do not. ii) Some types of experiences are not required for all jobs. For instance, it is only the VP security position that does require front office experience. iii) Some skills such as report writing skills and numerical skills are not required for all the positions. iv) Only one of the positions requires driving license while others do not require time management skills. Discussion The above analysis of the job roles, knowledge, skills and attributes reveals that security domain jobs regardless of the level of positions involve more or less the same roles. The only minor differences may result from the nature of the specific job in question. An analysis of the jobs has revealed six major similarities in roles including the following; One security role is the role of prevention of people and property from various security threats including such roles as ensuring WHS standards are implemented and enforced. They are supposed to be vigilant no matter the level of position to ensure that all security risks and threats are identified at all times and hence prevented while being abreast with the development in their respective industries and hence acquire relevant skills regardless of whether one is a normal security guard or a computer security expert especially as far as development in technology is concerned. Security jobs involve observing and reporting when incidences occur or any security lapses while coming up with various security management policies at their level of operations. Security work also involves being a team player within the group and as far as observing organizational security policies are concerned. Security jobs also require a minimum level of skills, knowledge and attributes. This has been revealed by the six similarities identified above (Baille, 2005). These include education and training, experience, skills and knowledge as identified above. However, these attributes may vary depending on the particular job in question and industry of operation. Thus, security jobs can be as simple as a security guard or as complex as a security analyst. The implication is that the domain plays a great role in our country’s economic development and hence should not be taken for granted. Conclusion Arising from the analysis above, I have discovered that security domain jobs are not only about physical security. They involve complex issues including the department of defense, security analysts, and work health and safety issues. I have also discovered that security management involves such complex things as policy and strategy planning as well as managing different stakeholders. This is the essence of the many skills required in all the jobs analyzed above. Working as a team member is a must in security jobs as one has to corporate both with his fellow workers as well as other stakeholders. This is the essence of communication skills and interpersonal skills requirements. In addition, security domain jobs would need a lot of educational and training qualifications as well as experience before one rises to managerial levels. References: Sennewald, C2003, Effective security management, Butterworth-Heinemann. Stephen, B2009, Assessing expert systems impact on users’ Jobs, Journal of management information systems, vol. 11, no. 2, pp. 101-107. Fay, J2010, Contemporary security management, Butterworth-Heinemann. Chen, H2006, Cyber security research and education, Security informatics, vol. 4, no. 1, pp. 54- 59. Baille, C2005, General security management, London, Rutledge. Jared, B2001, Security’s role in the organization, New York, John Willey & Sons. Linda, A2014, Integrating security mechanisms into embedded systems by domain-specific modeling, Security and Communication Networks, vol. 7, no. 12, pp. 2815-2832. Boffo, M2013, The relevance of security: A latent domain of attachment relationships, Scandinavian Journal of Psychology, vol. 55, no. 1 pp. 53-59. Ellen, M2016, Cyber security without cyber war, Conflict Security Law, vol. 5, no. 4, pp. 74-89. Jackson, B2014, Get the security management job you want, Sydney, Prentice Hall. Lazaer, P2007, Job security provision and employment, The Quarterly Journal of Economics, vol. 105, no. 3, pp. 699-720. Ritchey, D2016, Public and private security: Bridging the gap, Retrieved on 8th May 2016, from; http://www.securitymagazine.com/articles/80710-public-and-private-security-bridging- the-gap-1 Bender, K2013, Security officer’s attitude towards training and their work environment, Security Journal, vol. 11, no. 5, pp. 15-17. Lundberg, R2011, Deliberative Risk Taking to inform homeland security strategic planning, Journal of Homeland Security and Emergency Management, vol. 13, no. 1, pp. 14-21. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Analysis of Five Security-Related Job Titles with the Aim of Term Paper, n.d.)
Analysis of Five Security-Related Job Titles with the Aim of Term Paper. https://studentshare.org/human-resources/2066996-security-foundation
(Analysis of Five Security-Related Job Titles With the Aim of Term Paper)
Analysis of Five Security-Related Job Titles With the Aim of Term Paper. https://studentshare.org/human-resources/2066996-security-foundation.
“Analysis of Five Security-Related Job Titles With the Aim of Term Paper”. https://studentshare.org/human-resources/2066996-security-foundation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Analysis of Five Security-Related Job Titles

Food Security, Climate Change, and Population Growth Issues

his paper aims to critically analyze the strategic plan titled Aurora Precinct Structure Plan in regard to its ability to approach the issue of climate change, food insecurity, and population growth and to its adequacy in an analysis of future directions in planning.... The author of the paper "Food Security, Climate Change, and Population Growth Issues" will begin with the statement that the growth and prosperity of a country are directly proportional to its policies, effective implementation of these policies, and achievement of the desired results....
6 Pages (1500 words) Assignment

Functional Job Analysis

The tasks in the following paper "Functional job Analysis" should be listed separately with the appropriate KSA across from them.... he method would be successful for this job because it will produce qualified candidates who can positively affect the organization's performance and open several avenues for goal achievement....
3 Pages (750 words) Essay

The Job of the Range Controller Analysis

This assignment "The job of the Range Controller Analysis" describes the job of the Range Controller.... It outlines different responsibilities and requirements necessary for the job position.... The job of the Range Controller is complex, varied, and requires a specific set of skills and knowledge-base in the person.... he job is complex, varied, and requires a specific set of skills and knowledge-base in the person....
17 Pages (4250 words) Assignment

Growth Area Authoritys Aurora Precinct Structure Plan

The paper 'Growth Area Authority's Aurora Precinct Structure Plan' focuses on the growth and prosperity of a country, which is directly proportional to its policies, effective implementation of these policies and achievement of the desired results.... Australia is more susceptible to the changing environment....
6 Pages (1500 words) Assignment

The Security Domain in Australia

The names of the job titles in the analyzed firms are as follows, assistant security advisor.... ive job categories are critically analyzed according to prevailing theories.... The paper shows five annotated bibliographies each showing a job description....
9 Pages (2250 words) Annotated Bibliography

Critical Analysis of Security-Related Job Titles

The paper "Critical Analysis of security-related job titles" states that Transport Security Operations advertised its job vacancy of Senior Transport Security Inspector.... The emergence of these security domains has resulted in the information and availability of job vacancies to the citizens who need job vacancies.... To ensure that this analysis is kept up to date, some job vacancies advertised by several companies on security must be reviewed and analyzed....
11 Pages (2750 words) Essay

A Critical Analysis of the Provided Security Related Job

This paper is prepared with the aim of bringing out these similarities and differences of the jobs in the security domain by conducting a critical analysis of five different security-related job titles (Daft, 2015).... The paper " A Critical analysis of the Provided Security Related Job " is a great example of a term paper on management.... The paper " A Critical analysis of the Provided Security Related Job " is a great example of a term paper on management....
9 Pages (2250 words) Term Paper

Measure of Job Satisfaction

The paper 'Measure of job Satisfaction' is an actual example of human resources literature review.... As defined by Jerome (2013), job satisfaction is the pleasure gained or derived by an employee from his or her career.... job satisfaction is influenced by many factors among which the most significant ones are favorable working conditions, hike in salary, promotion, workgroups, etc.... The paper 'Measure of job Satisfaction' is an actual example of human resources literature review....
10 Pages (2500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us