StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Job Analysis - Technical Security-Counter Measures Officer - Term Paper Example

Cite this document
Summary
From the paper "Security Job Analysis - Technical Security-Counter Measures Officer" it is clear that the individual candidate should be a person who has a high level of communication competency to enhance fruitful interactions with the team members that would lead to effective corporations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful

Extract of sample "Security Job Analysis - Technical Security-Counter Measures Officer"

Security Job Analysis Name Institutional Affiliation Security Job Analysis Introduction The security personals are responsible for protecting people, contents such as information and buildings. They personals are expected to deal with the broad range of safety issues that might negatively affect the organization. The security job would require the applicants to a wide variety of skills and knowledge about both the soft and technical aspects. Most of the employers in the security industry would need a workforce with experience which they believe it is essential for the operations (Sekscinski 2011). Most of the applicants with the experience from either the police or the army usually gain more advantage than others who have no expertise in the discipline forces. The knowledge in the working positions that involves customers would also be beneficial to the candidate when applying for a security job in most cases. In the security industry, the human resource would require having career progressions by receiving additional training (Hall 2010). The training can be provided by the employer that equips the employees with the other skills that they may need while they are on the job such as the performance of first aids and how to handle security dog. Analysis Job description one The job is about a vacant position of a Technical Security-Counter Measures (TSCM) officer. The position is for a candidate that knows how to deal with electronic equipment. That shows that one should be either an electrician or electromechanical engineer by profession. The candidate applying for the job is expected to have knowledge and skills of analysis to perform an inspection and identify risk areas. The candidate is also expected to consistently offer information regarding the technical security issues of the organization which makes the effective communication skills to be essential. The position also requires the candidate to be well conversant with the technological advancement in order adapt to the changes that are rapidly occurring. Job Description Two The job description about the protective security officer requires an individual who has Digital Strategy and Operations and has achieved APS Level 6. The candidate is required to have experience in protective security to be able to supervise, monitor and to design policies, standard and guidelines that are related to the entire components of protective security. The position will require the candidate to undergo Negative Vetting (NV2) that is classified and therefore, the knowledge of classified security environment is essential. Further, the candidate would also be expected to acquire NV2 and continue with it throughout the entire period of employment. Job Description Three The job description is about a vacant position of manager in-charge of security and Traffic. The employer is seeking a candidate that is having more than ten years experience so that to be able to analyze security complex situations. The university is a significant establishment that can face various security threats and therefore, the candidate is expecting to be a person who has worked in a multidisciplinary environment while in charge of security. The manager would be expected to create effective leadership in improving and continuous developing in the operational areas of Security and Traffic Management. The applicant would also be expected to exhaust the use of systems, software, and technology to enable efficiency operations of the department. Job Description Four The advertisement is about Precinct Security Manager Position in a company. The employer requires an individual candidate to have at least five years experience in the operations of the security functions. Alternatively, those with undergraduate degrees and above are also expected at least two years experience in the roles of the security. The applicant must have work experience in various aspects of Dumas house such as on its guidelines and regulations, the culture of the organization and its working environment. Further, the successful applicant must have experience in the assignment instructions and the stakeholder’s introduction of the house. Job Description Five The job advertisement is about the vacant position of an intelligence Officer. The employer expected that candidate to be one who is capable of achieving the intended objectivities through ensuring that the desired results are met and implementing and steering the changes. The officer is also supposed to create the capability of the organization to be responsive and to ensure the sustenance of the professional practices. Further, the applicant should high skills in communication so that to facilitate efficient negotiation processes, creating good interpersonal relationships and the coordination of tasks (Rhee et al. 2012). Moreover, the applicant should be capable of developing both internal and external relationships to enhance partnership and co-operations, to develop individuals and to appreciate the diversity of the people in the organization. Discussion Job description one Protecting information and the electronic surveillance is essential to the government and the businesses (Hales et al. 2014). The countermeasures and the competent personals are expected to deal with the security threat that may cause harm to the organization. It can be done by ensuring that all the taps on bugs and phones can be detected. The detection of the security surveillance 's hard to and in the case where there is an attack; the technical officer is expected to be able to understand the procedures to be taken and the equipment that can be used. The immediate steps a technical officer should take are to solve the problem of surveillance and utilize the essential concepts of security to protect valuable information (Thomas 2008). For instance, the officer has expected some measures such as to check the vulnerability of the facility, the security of the physical facility and to determine the countermeasure tools which are significant in the means of protecting the data. In the case where the technical officer detects any threats, it would be appropriate to conduct vulnerability evaluation. The technical officer is entitled to assess any potential area that might be attacked and determine the worthiness of target and the potential attacker that would mostly require the information and the means that would be used to breach the security of the facility (Gill 2012). As a countermeasure expert, the officer is expected to have communication skills to establish well written and verbal technical reports about the risks assessment to enhance understanding so that effective actions can be undertaken (Raza et al. 2009). Further, the countermeasures are advancing with the technological development which helps to make them more efficient and easier. Therefore, the technical team is expected to be having sufficient knowledge on technological changes in the use of countermeasures to protect information. Job Description Two The protective security personals are prominent in the organization especially in the co-ordination of the physical, personnel, and information that are valuable. The protective security is a crucial department as it is involved with the protection of the assets, information and the people from the potential risks (Duvenage and Hough 2011). The teams are always involved with the development of the policy standards, training, and procedures that would support the security operations (Betts 2009). These initiatives would reinforce the integrity of high standard and ensure that the entire members of staff are aware of security. The awareness is typically done by assisting the workers to understand their roles and accountabilities within the organization. The head of protective security has a direct mandate of ensuring that the physical, personnel and the information are secure (Elsea et al. 2008). For these terms to happen there are several responsibilities that the protective team has to do. They record, disseminate and account for all the valuable information and place them in an extensively regulated environment where there is on the unauthorized party can access them (Sarre and Vernon 2013). After the information has been utilized for the intended purpose, the protective security officer would be expected to lead the team to the destruction of those classified materials. The protective security officer should also ensure that security framework is established to ensure that the operations are effectively done (DeMott 2010). Some of the elements are the security policies, guidelines, procedures which should be developed and sustained to ensure that services of security are done within classified working settings. The officer should equip the team with safety skills and knowledge through conducting briefings and additional training programs for further updates (Wilkinson 2007). The officer should be able to ensure that the policies of the government such development and performing of the record management checks. The communication skills would help the protective security officer to offer consultancy services to the clients and ensure that there is sufficient job relationship with the subordinates and executives through interactions. Job Description Three The responsibilities of security and Traffic Manager in the university setting are to provide safety and security of the students, staffs, physical infrastructure and visitors. Further, the manager would be expected to regulate and manage the parking spaces of the various campuses of the University (Peltier 2016). Therefore, it makes the university to search for a candidate with extensive experience in the parking and security. An individual who is capable of leading the operations in those two sections that is parking and safety with a team that is capable of achieving high performance. The positions require an individual with the capability to manage the significant operations in the security and parking department in the university (Council 2011). There are expectations that a successful candidate enhances continuous advancement and improvements in the professionals’ practices within the area of operations. The candidates should be well conversant with the technological development to maximize the use of technical systems and software that can ensure the security and parking operations are efficient (Prunckun 2012). Further, the manager would be expected to utilize technology simplify operational duties and performance of services. The manager would also be required to manage the major contractors effectively by maximizing the value addition in the contracts that are currently going on in the university. The manager should be an effective communicator to ensure that is the efficient flow of information within the unit and with other departments within the university. The management believes that effective communication would enhance coordination of tasks to improve efficiency (Colibasanu 2008). The manager should know posse’s problem-solving skills so that to be able to deliberate on the issues that may arise within the department of security and parking. Job Description Four The position of a Precinct Security Manager requires someone with vast experience in the functions of security. The capability of the role requires someone with higher education standard such as undergraduate degree with the skills and knowledge in security related course. The individual should be well conversant with Security Team Emergency Procedures and the operations of the fire alarm systems in the case of the fire outbreak (dos Santos Soares and Vrancken 2008). The candidate should have analytical skills to be able to assess the potential risks and report the information to facilitate strategic management. Job Description Five The intelligent officer is expected to lead the National Intelligent Unit in the Fisheries department to perform its responsibilities effectively. The individual candidate should have analytical, and measurement skills to determine the nature and the level risks compliance and offer advice to the decision makers concerning the potential threats that may negatively affect the fisheries of Commonwealth. The officer should have skills and knowledge of performing management functions such as planning and designing several strategies of operations that would help to control the potential risks (Musolino 2011). It makes the successful candidate be a strategic thinker to develop techniques that would be effective. The individual candidate should be a person who has a high level of communication competency so that to enhance fruitful interactions with the team members that would lead to effective corporations (Colibasanu 2008). The communication skills would improve fluent report writing which also has clear procedures of the standard of operations that are crucial. The communication competency would help the successful applicant to create a good relationship with the external and internal stakeholders of Australian Fisheries Management Authority (AFMA) who are responsible for the VMS program implementations. The position requires an individual with high level of integrity to avoid compromises that could lead to intended security threats (Braz 2008). Further, the potential candidate should have a clear understanding of the diversity in the workplace and also the principles of health and safety in the operational environment. Conclusions There are various careers that people who are interested in working in security industry can get engaged. Most of the security positions require education qualifications and the past experiences in the related area that one is applying. The employers are emphasizing that the applicants should also possess both the technical expertise and the soft skills such as communication and teamwork. Further, the personal attributes are also important especially integrity when it comes to the security industry. The employers would like to hire candidates that can be trusted with the responsibilities of guarding their wealth and valuable personals in the organization. References Sekscinski, A. (2011). The Organization of State Bodies Responsible for Internal Security in Norway. Internal Security, 3(1), 97. Colibasanu, A. (2008). Between Intelligence and Espionage in the Contemporary Business Environment. Hales, D., Howes, R., Cooper, E., Porter-Greene, M., & Vallerand, A. (2014). eSecurity Portfolio: Overview, Analysis of Value Added, and Way Ahead (No. DRDC-RDDC-2014-R113). DRDC-Centre for Security Science Ottawa, Ontario Canada. Duvenage, P. C., & Hough, M. M. (2011). The conceptual structuring of the intelligence and counterintelligence processes: enduring holy grails or crumling axioms-quo vadis. Prunckun, H. (2012). Counterintelligence theory and practice. Rowman & LIttlefield Publishers. Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Elsea, J. K., Schwartz, M., & Nakamura, K. H. (2008, August). Private security contractors in Iraq: Background, legal status, and other issues. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE. Hall, S. A. (2010). An examination of British sport security strategies, legislation, and risk management practices. The Sport Journal, 13(2). Wilkinson, P. (Ed.). (2007). Homeland Security in the UK: Future preparedness for terrorist attack since 9/11. Routledge. Raza, S., Slabbert, A., Voigt, T., & Landernäs, K. (2009, September). Security considerations for the WirelessHART protocol. In Emerging Technologies & Factory Automation, 2009. ETFA 2009. IEEE Conference on (pp. 1-8). IEEE. dos Santos Soares, M., & Vrancken, J. L. (2008). Model-Driven User Requirements Specification using SysML. JSW, 3(6), 57-68. Braz, F. A., Fernandez, E. B., & VanHilst, M. (2008, September). Eliciting security requirements through misuse activities. In Database and Expert Systems Application, 2008. DEXA'08. 19th International Workshop on (pp. 328-333). IEEE. Rhee, K., Jeon, W., & Won, D. (2012). Security requirements of a mobile device management system. International Journal of Security and Its Applications, 6(2), 353-358. Council, D. V. (2011). WILLOW COURT & BARRACKS PRECINCT. Musolino, S. V., Coulter, D. T., & Tedla, H. (2011). Cesium chloride: dispersibility or security?. DeMott, D. A. (2010). The Milieu of the Boardroom and the Precinct of Employment. NCL Rev., 89, 749. Sarre, R. T., & Vernon, A. (2013). Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process. Betts, R. K. (2009). Enemies of intelligence: Knowledge and power in American national security. Columbia University Press. Gill, P. (2012). Policing Politics: security intelligence and the liberal democratic state. Routledge. Thomas, M. (2008). Empires of Intelligence: Security Services and Colonial Disorder after 1914. Univ of California Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Job Analysis Term Paper Example | Topics and Well Written Essays - 2000 words, n.d.)
Security Job Analysis Term Paper Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/human-resources/2068205-job-analysis
(Security Job Analysis Term Paper Example | Topics and Well Written Essays - 2000 Words)
Security Job Analysis Term Paper Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/human-resources/2068205-job-analysis.
“Security Job Analysis Term Paper Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/human-resources/2068205-job-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Job Analysis - Technical Security-Counter Measures Officer

Security Assessment Check For Premier Commercial Bank

This is done through ensuring that proper handling and correct security measures are complied with so as no to contradict our goal.... Thirdly, the security guards who escort money on transit should have the right facilities so as to sustain security measures.... In this view during the escort there should also be some law enforcement like police officers who'll maintain and propel security measures.... Research is done to give recommendations so as to minimize if not put to an end to all threats to Premier Bank's state of security....
13 Pages (3250 words) Essay

Information security legislation

Even those vertical organizations such as financial services organizations, complication to adhere to security measures brought about by different regulations, for example the US Gramm-Leach Biley Act, 1999 (GLBA),... This realization is increasing in the wake of increasing theft occurrences and other information security.... Organization currently need standards, in the past many organization mostly tended to use a single information security standard for example BS 7799 part 2 (an Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security....
19 Pages (4750 words) Essay

Information Security System Management for Swift Courier Company

From the paper "Information security System Management for Swift Courier Company" it is clear that it is important for a company to evaluate its position and systematically come up with methods that are meant to help in improving and achieving the company's targets.... The company needs to have the best workers in different positions since security is a sensitive aspect of the company.... When recruiting new employees as security personnel it is important for the company to ensure that it gets the best minds with experience and qualification being the most important items in the recruitment process....
44 Pages (11000 words) Capstone Project

Information Security Plan

Corrective measures have to be taken by each organization to ensure that both the money-making assets of the company are protected.... Corrective measures have to be taken by each organization to ensure that both the money making assets of the company are protected.... Organizations are created by people, buildings and procedures, and these three ingredients can perform well only if they are assure of their security.... From the exchange of information for communication purpose to the exchange of secrets pertaining to the security of countries, cyberspace has become the medium of choice for everyone....
15 Pages (3750 words) Case Study

My Critical Analysis of Five Security Related Jobs

These positions include Security Sector Reform officer (U.... The officer is also supposed to develop and run protective security training programs, create awareness on matters concerning the organization; and finally carry out investigations within the premises of the organization.... The officer is also supposed to liaise with the Commonwealth DPP and Australian Federal Police as required by the organization's policy.... ecurity Sector Reform officer (U....
9 Pages (2250 words) Essay

The Position of Security Manager in Corporate Security

nalysis of Job Description Job Description One: Security Manager The employer requires the security manager to have in-depth knowledge of how to comply with the frameworks that govern the running of the organization, the procedures used to make decisions, and the measures that the organization needs to create an airtight defense for the organization.... He is also expected to manage the company's budget on security measures so that it aligns with the company's allocation for this department....
11 Pages (2750 words) Term Paper

Two Security-Related Job Postings and How They Relate to the Security Theory

hey identify as well as assess any form of threat, put measures in place for any problem, and make the decision on how they can avoid transfer, or reduce problems.... The purpose of this paper is to carry out an analysis of two security-related job postings and how the jobs relate to the security theory (Harr & Hess, 2010).... analysis of Job Description Compliance and Risk Management Advisor Compliance and risk management activities as the advisor of the company on matters related to the potential risk to the existence and profitability of the company....
11 Pages (2750 words) Term Paper

Security Foundations: Core Concepts

The officer has to take the report to the supervisor of the Security Control Centre daily.... he officer has to perform a proactive role in the maintenance and restoration of security on nations' infrastructure as well as assets.... herefore, security is said to involve survival measures.... Securitization legitimizes the usage of some measures for the neutralization of threats.... The various segments include technical security, protective security, intelligence security, technical security as well as the security manager....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us