StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Critical Analysis of Security Job Titles - Term Paper Example

Cite this document
Summary
The paper "Critical Analysis of Security Job Titles" discusses that in the security domain, there are numerous security-based positions such as intelligence officers, security managers, security and traffic managers, technical security officers, and protective security officers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful

Extract of sample "Critical Analysis of Security Job Titles"

Critical Analysis of Security Job Titles Name Institution 1. Introduction In the security domain, there are diverse careers pursued under different job titles. The increase in demand for security related services in the society has consequently led to a commensurate increase in the demand for security officers (Liebling, Price, & Shefer, 2010). Nonetheless, different security-based jobs are connected to different roles and responsibilities (Miller, & Braswell, 2010). Hence, the officers are required to have dissimilar skills, attributes and knowledge. This paper seeks to explore a critical analysis of the above security job titles. It describes the specific jobs, analysis of themes based on the job titles, skills, knowledge and attribute basics and the manner through which these requisites connect to security theory and general academic requirements. The discussion will be based on the literature about the particular job titles. 2. Analysis of Job Descriptions Intelligence Officer Fisheries The officer is responsible for analyzing and measuring the level of compliance and applies strategies towards the mitigation of the likely threats. In addition, the officer should be a strategic thinker with the ability to achieve desirable results, display professionalism and resilience, team player and ability to negotiate, communicate clearly and relate well with other employees. Ability to develop new and nurture existing internal relationships, provide mentorship and guidance to others is a key skill requirement. The officer will assist in management of the vessel monitoring system and maintaining relationship with all stakeholders; bill all the agencies for utilizing the platform and assisting in developing key reports and operating procedures. Job analysis table for intelligence officer fisheries KNOWLEDGE SKILLS ATTRIBUTES Ability to achieve results Ability to manage a team Team player Strategic thinker Good decision making skills Strong communication skills Vessel management systems Report writing skills, planning and analysis skills Mentor Biling Ability to display professionalism Ability to support management operations Risk management/ compliance Interpersonal skills Precinct Security Manager The officer is expected to assess and manage numerous security-based functions such as parking, safety and offer security to the employees, visitors, tenants, and the business facilities. In addition, one should be able to maintain the installed surveillance and security system and ensure that all the staff under his docket conduct their duties accordance their job description. Ability to train operational staff, maintenance of up to date security & safety methods and maintaining awareness key skills for the position include, risk management, security management, corporate governance skills, compliance and business continuity based approach within the department and other administrative roles. Job analysis table for Precinct Security Manager KNOWLEDGE SKILLS ATTRIBUTES Standard operating procedures Ability to a team Team player Security and surveillance systems Training skills Good communication skills Western Australian State Emergency Management policy, Report writing skills Seven years work experience or a bachelor’s degree with three years’ experience Management experience Liaison Risk management Investigation skills Security and Traffic Manager A security and traffic manager is required to have knowledge in parking and general security management, ability to provide emergency responses, security and traffic system installation, management and maintenance through control of parking meters, intruder alarms and CCTV, as well as the infringement applications. One also needs to demonstrate the ability to communicate, prioritize and solve problems in a team-based environment, as well as addition of value through the successful management of major contractors. Job analysis table for Security and Traffic Manager KNOWLEDGE SKILLS ATTRIBUTES Strategic thinker Ability to manage a team Team player Security and parking Leadership skills Ten years’ experience Achieve high quality outcomes Reporting and Report writing skills Multi-national experience Procurement and contract management Planning skills Strong communication skills Security and traffic systems Oversight and problem solving Tech savvy Protective Security Officer In this position, the officer is mandated to oversee the recording of planned material information and distribution of data in the appropriate operating environment. Besides, one needs to liaise with the stakeholders and come up with reports and statistics as per the Government policies. The officer also needs to demonstrate the ability to operate in a disciplined environment, should exhibit high personal integrity and effective communication skills. Job analysis table for protective security officer KNOWLEDGE SKILLS ATTRIBUTES Risk Management Supporting team Team player Supervision Advisory to clients Guidelines and standard operating procedures Protective security Reporting skills Experience in Protective Security Record keeping and accounting Awareness Training Strong communication skills Auditing Oversight Knowledge of mandatory Government policies. Technical Security Officer The officer works in a team in the T4 Engineering. He is responsible for carrying out technical inspections and monitoring the radio frequencies. Besides, it is the responsibility of the technical security officer to assess different security tools and test their vulnerabilities, as well as monitoring the changes in the technology to match their gadgets to the technology growth for the purpose of achieving the target outcome as per the technical security. One is also required to offer training to the organizational customers. Job analysis table for technical security officer KNOWLEDGE SKILLS ATTRIBUTES Inspection and risk management Supporting team Team player Tech savvy Problem solving skills Electronics and/or electro-mechanical engineering, Procurement knowledge Analytical and resourceful mind-set Experience in the installation, configuration, and maintenance of security equipment and systems Cyber security and IT networks Technical awareness Training Experience in building construction methods. Audit knowledge Oversight Knowledge of mandatory Government policies. 3. Findings or Content and Thematic Analysis Themes Table JD1 JD2 JD3 JD4 JD5 Knowledge Result oriented, strategic thinker, system knowledge, billing, Risk management Risk Management, Management Experience, Security and surveillance Strategic thinker, security and parking systems, procurement skills Risk management, Supervision, protective security, systems audit and accounting Inspection and risk, tech savvy, procurement, cyber and network and audit Skills Ability to manage a team, decision making, report, planning and interpersonal skills Teamwork, Reporting , Training skills, investigation skills Leadership, report writing and planning skills, problem solving Reporting, training, support, oversight and advisory Supporting team, problem solving, analytical, training and oversight Attributes Team player, communication, experience and ability to support Experience, communication skills team player Team player, experience, communication skills Team player, Experience, communication, government and policies Team payer, experience, government policies, engineering Intelligence Officer(IO) An intelligence officer (IO) is a security-related job, whereby the professional works under a team with the responsibilities of keeping safety. The IO is supposed to engage in investigations, analysis of information, carry out research and prepare reports in relation to the wider security scope. According to the argument put forth by Fay (2010), an IO is supposed to liaise with stakeholders in order to have a friendly working relationship internally and externally. He/she should value diversity and facilitate partnerships to develop, he should mentor and guide people. The position is also associated with the responsibility of providing security services in collaboration with other security officers. Moreover, he/she is also charged with the responsibility of detection and prevention of planned crimes in the society. One needs to exhibit strong interpersonal skills, in addition to oral, written, outstanding negotiation and communication skills. Sageer, Rafat, and Agarwal, (2012) identify that, it is the responsibility of this officer to plan and prepare report(s) on security status, based on the information gathered from criminal investigations carried out in the operative area. Precinct Security Manage(SM) The precinct security manager is an officer working in a precinct security locality capable of providing training to the incoming security service providers. One should have the knowledge on maintenance of up-to-date safety and security plans, to offer supervision and security training. Tohidi (2011) emphasizes that the security manager needs to have knowledge and skills in administration of security management strategy. He/she should be able to gather intelligence on the likelihood of a threat, investigate misconduct and initiate legal proceedings to any illegal activity undertaken in the premise. The security manager also ought to attend exercises, training and protection briefings of the organization. According to Popova and Sharpanskykh (2010), the security manager operates in a team and equally needs to demonstrate skills related to planning, recording of gathered information through intelligence in the process of offering security services and as per the security code of the organization. Moreover, one should have the ability to retain knowledge of procedures and policy. Security and Traffic Manager(S&TM) Security and Traffic manager is a security officer with the responsibility of controlling the traffic flow and ensuring security management in the location of operation. As articulated by Chisholm (2014), this officer needs to be an expert in conducting traffic control and management. Besides, the person plays the roles associated with improvement of security and safety on other people the physical infrastructure, and regulates the parking lot of the institution. Furthermore, Albrechtsen and Hovden (2010) recognize that, he should seek ideas from other team members for effective prioritization, efficient problem-solving initiatives, recording skills and communication of security measures in place. Protective Security Officer (PSO) Protective security officer works under a protective security team leader, which has the mandate to co-ordinate and manage numerous aspects of information, and personnel in the security background. The officer’s daily business operations include protection of people, assets, and information against any threat. Besides, the officer should engage in effective communication practices when reporting any protective security data to the party agencies. Talbot and Jakeman (2011) postulate that this officer needs to offer advice to the clients in regard to the protective security policies and procedures. Moreover, this officer is responsible for the development and implementation and supervision of standards processes guidelines, and policies under protective security. One should also offer awareness training, security briefings and is in-charge of daily operations of a protective security team (Hughes, & Palen, 2012). Technical Security Officer (TSO) Technical Security Officer needs to demonstrate an effectual technical grounding in mechanical and electronics engineering. Besides, one needs to show the ability to communicate effectively, acquisition of the current technology and evaluation of the area’s technical security. According to the argument put forth by Tamjidyamcholo, Baba, Tamjid, and Gholipour, (2013), the technical security officer should show the ability to work in a team, offer training and advice, as well as reports related to the working outcomes. It is also necessary for one to prove some knowledge of cyber-security vulnerabilities and IT networks. 4. Discussion The above security-related job positions require individuals to meet all the requirements based on the skills, knowledge, and attributes (Campbell, & Campbell, 2010). In addition, it is important for an officer to have the ability to conduct all the associated roles. Furthermore, based on the fact that these jobs are associated with the provision of security and safety services, for a person to operate in these positions, he or she needs to have the ability to investigate crimes, mitigate risks, and threats, as well as the capacity to record the findings. According to the argument put forth by Stelfox (2013), the security officers needs to have the experience in surveillance of security incidences and the capacity to apply appropriate strategies that enhances the improvement of safety and security in Australian society. In addition to experience, security personnel are required to have strong communication skills, ability to adapt to new technological trends, report writing skills, ability to support others and ability to work in a team. Working as a team and applying effective communication skills is a necessity for the security officers. Sylves (2014) articulates that security officers are required to have the skills of investigating skills and offer security to other significant individuals, as well as the provision of advice on how to manage security and planning of protective and security activities. 5. Conclusion In the security domain, there are numerous security-based positions such as intelligence officers, security managers, security and traffic managers, technical security officers, and protective security officers. In this job positions, the officers are required to perform specific responsibilities. On the other hand, every individual is supposed to have the required knowledge, skills, and attribute requisites. It is clear that all the security officers are required to have expertise in the investigation and recording of the crime reports. The officers are supposed to work as a team in order to be successful in the implementation of the drawn strategies and enhance the provision of security in the society. Communication skills, problem-solving, and strategic-thinking are some of the common skills required to be demonstrated by security officers in various positions. Moreover, the ability to investigate and conduct security incident reporting to the relevant departments is essential for every security officer. 6. References Albrechtsen, E., & Hovden, J. (2010). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4), 432-445. Campbell, D. J., & Campbell, K. M. (2010). Soldiers as police officers/police officers as soldiers: Role evolution and revolution in the United States. Armed Forces & Society, 36(2), 327-350. Chisholm, A. (2014). Marketing the Gurkha security package: colonial histories and neoliberal economies of private security. Security Dialogue, 45(4), 349-372. Fay, J. (2010). Contemporary security management. Elsevier. Hughes, A. L., & Palen, L. (2012). The evolving role of the public information officer: An examination of social media in emergency management. Journal of Homeland Security and Emergency Management, 9(1), 1-20. Liebling, A., Price, D., & Shefer, G. (2010). The prison officer. Routledge. Miller, L. S., & Braswell, M. C. (2010). Crime scene investigation. Elsevier Science. Popova, V., & Sharpanskykh, A. (2010). Modeling organizational performance indicators. Information systems, 35(4), 505-527. Sageer, A., Rafat, S., & Agarwal, P. (2012). Identification of variables affecting employee satisfaction and their impact on the organization. IOSR Journal of Business and Management, 5(1), 32-39. Stelfox, P. (2013). Criminal investigation: An introduction to principles and practice. Routledge. Sylves, R. (2014). Disaster policy and politics: Emergency management and homeland security. CQ Press. Talbot, J., & Jakeman, M. (2011). Security risk management body of knowledge (Vol. 69). John Wiley & Sons. Tamjidyamcholo, A., Baba, M. S. B., Tamjid, H., & Gholipour, R. (2013). Information security–Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language. Computers & Education, 68, 223-232. Tohidi, H. (2011). The Role of Risk Management in IT systems of organizations. Procedia Computer Science, 3, 881-887. Winsor, T. P. (2012). Independent Review of Police Officer and Staff Remuneration and Conditions final report (Vol. 8325). The Stationery Office. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Critical Analysis of Security Job Titles Term Paper - 1, n.d.)
Critical Analysis of Security Job Titles Term Paper - 1. https://studentshare.org/human-resources/2068268-you-are-to-conduct-a-critical-analysis-of-the-provided-security-related-job-titles-and-communicate
(Critical Analysis of Security Job Titles Term Paper - 1)
Critical Analysis of Security Job Titles Term Paper - 1. https://studentshare.org/human-resources/2068268-you-are-to-conduct-a-critical-analysis-of-the-provided-security-related-job-titles-and-communicate.
“Critical Analysis of Security Job Titles Term Paper - 1”. https://studentshare.org/human-resources/2068268-you-are-to-conduct-a-critical-analysis-of-the-provided-security-related-job-titles-and-communicate.
  • Cited: 0 times

CHECK THESE SAMPLES OF Critical Analysis of Security Job Titles

Job description of ICTbusiness and systems analysts in organisations and different countries

Business analysis encompasses assessments, studies, and analysis of the business functions applied with IT and software applications.... The researcher of this essay aims to define the job functions of business and systems analysts in organisations.... job compositions and functions in organisations have been modified and complicated with the advent of globalisation and technology.... 4 Chapter analysis …………………………………………………………....
104 Pages (26000 words) Thesis

Food Security, Climate Change, and Population Growth Issues

Aim This paper aims to critically analyze the strategic plan titled Aurora Precinct Structure Plan in regard to its ability to approach the issue of climate change, food insecurity and population growth and to its adequacy to an analysis of future directions in planning.... Climate Change, Food security and Population Growth Issues in Aurora According to the Climate Change Department of Australia, the country has observed climate change affect in three aspects....
6 Pages (1500 words) Assignment

Jobs in Cyber security

Some of the cyber-security job titles include information security analysts, security management specialist, computer systems analysts, software developer/applications, Network and computer systems' administrator, Computer systems engineer, auditor, security manager, and intelligence analyst (Abell Foundation 16).... Overall, cyber security job opportunities have been on an upwards trend and projections into the near future indicate a critical need for cyber security professionals to fill cyber security posts in various capacities and titles....
3 Pages (750 words) Essay

Media Bias Towards the Administration Memo

This case study "Media Bias Towards the Administration Memo" cites the results of a number of media studies that were carried out in the period leading up to the Iraq War and the months following it.... .... ... ... Prior to doing so, however, I would like to cite the results of a number of media studies which were carried out in the period leading up to the Iraq War and the months following it....
6 Pages (1500 words) Case Study

Successful Job Search

From the paper "Successful job Search" it is clear that with the rapid increase in focus on education in the country, it has become extremely imperative to have the best of talent in our education system.... The performance on your current job and people talking positively about your work will help.... Also whenever you are in need of a job, it will definitely help to inform the forums of your skills, knowledge and expertise – you can generate a lot of references to openings this way....
15 Pages (3750 words) Assignment

Growth Area Authoritys Aurora Precinct Structure Plan

The paper 'Growth Area Authority's Aurora Precinct Structure Plan' focuses on the growth and prosperity of a country, which is directly proportional to its policies, effective implementation of these policies and achievement of the desired results.... Australia is more susceptible to the changing environment....
6 Pages (1500 words) Assignment

The Security Domain in Australia

The names of the job titles in the analyzed firms are as follows, assistant security advisor.... In case of security sector officer, there is a clear definition of the applicants.... The validity of the source is the writer is a well-recognized person in the united nation department of security.... The site demonstrates that the firm is in need of security consultant and individual from various Australian cities are called to apply....
9 Pages (2250 words) Annotated Bibliography

Security Foundation

This report will conduct a critical analysis of Cryptography and Application and Systems Development Security to conduct related job titles (Edward, 2005).... The analysis of these two jobs will include micro-focus that highlights the two positions and macro-level analysis indicating similarities and differences for the two positions.... his job entails the use of a combination of information engineering, data modelling, sampling and accounting principles (Anderson, 2003), mathematical model building to ensure comprehensive and efficient designs (Fennelly, 2004)....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us