StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Running of Security Issues in Company - Case Study Example

Cite this document
Summary
The company that is the subject of this paper "Running of Security Issues in Company" is the Massive Gas Plant Company which is primarily involved in the production of gas and oil. The plant is situated near an oil-rich region in order to ease the transport of raw materials and finished products…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful

Extract of sample "Running of Security Issues in Company"

Name Course Lecturer Date Report Table of Contents Table of Contents 1 1.0 Description of the facility 2 2.0 Organizational Chart 3 3.0 Justification for the position 3 4.0 Job description 5 5.0 Selection criteria 6 6.0 Job advertisement 6 7.0 Selection panel and their roles 6 8.0 Rating scale 8 9.0 Selection method 9 10.0 Interview Schedule 10 Abstract With the increased security issues in the current global market any energy related facility need to ensure security is a core concern in the management. As such, the new facility recognizes the above and therefore, there is a need to create a position of a Senior Security Officer who will be mandated with the overall running of security issues in the company. Therefore, the report seeks to give the needed information leading to filling of this position. 1.0 Description of the facility The Massive Gas Plant Company is primarily involved in the production of gas and oil. The plant is situated near an oil rich region in order to ease transport of raw material and finished products. As such, the plant has several facilities that are used in the production of energy related products including drill rigs, pumping equipment, evaporation and waste pits, storage tanks, shale gas components and facilities, gas and oil treatment equipment. With the above, it is quite evident that the facility will involve a lot of movement and activities and as such safety precautions is a sensitive issue to consider in the running the facility. Given that such equipment requires trained personnel to handle them, the company has employed able employees who are specialised in different fields related in the production of energy related products. 2.0 Organizational Chart 3.0 Justification for the position Indeed, in the recent years, threats on energy plants and systems have been on the rise; and therefore, security details cannot be taken lightly. The government is concerned that energy infrastructure may offer terrorists a great opportunity to bring catastrophic damage not only to the economy but also the safety and health of people. Notably, running energy related plant demand strict security measures due to three major factors. Firstly, it is in the interesting of the state government to protect one of the national most reliable energy production sectors. It is worth noting a disruption in the energy systems is primarily an economic disruption issue in that it may affect running of other related sectors in the country. Secondly, any security disruption may also lead to a negative impact on the safety and health of the public. This is attributed to the fact that any attack on the facility may expose thousands of people to massive fires, toxic clouds and radiation. Thirdly, security breach may also affect the quality of the environment. Under this, it has been noted with much concern that the oil industry is one of the greatest sources of environmental pollution in the country. Therefore, further security issues that may results to spills or other security related incidents may further deteriorate the environment. Given that fact that the facility is located near a shoreline, any security disruption, be it the act of terrorism, will indeed endanger marine life (Brown et al., 22). With this; that is, the state of security and vulnerability of energy plants. The national security has prioritized energy security in the state as one of the highest responsibility that private plants and companies must consider. Therefore, with the setting up and running of the new facility, the need to have a Senior Security Officer to oversee the security of the facility cannot be overemphasized. In this regard, an advertisement permit will be obtained from the CEO, who will not only emphasize the specifications of the interviewees but also will see to it that the right protocols have been followed due to the sensitivity of the position. It is important to note to that in requesting for an authorization to advertise, a written documentation will be forwarded to the management describing or justify the need to have the position at the managerial level. The management through the CEO will give the authorization to the appropriate department to carry out the advertisement. 4.0 Job description The SSO will report directly to the director of corporate safety and security who then reports to the CEO; and will coordinate and oversee the security efforts in the facility; that is, including communications, information technology and equipment, human resources, facilities management, legal , identifying security standards and initiatives and other relate functions as directed by the top management. He or she will be mandated to; lead safety and risk management duties or activities; oversee a group of security vendors ad directors who safeguard the facility’s assets a, physical safety of visitors and employees, develop and implement of global security guidelines, standard, policies and procedure to ensure the maintenance of security, physical security or protection responsibilities also include access control systems, employee security education and training, facility protection, network security architecture and monitoring policies, work with the management to prioritize security in the facility, maintain a working relationship with local, federal and state law enforcement and related government agencies, work with external consultants if need be for including independent security audit, oversee and coordinate any incidence response plan and any investigation of security violate; and such assist with the legal and disciplinary matters. 5.0 Selection criteria The selection criteria will consider various key success factors for the SSO position including; Ability to create and maintain a competitive advantage via an innovative and pragmatic security solutions Demonstrate high level of ability and integrity principles under both external and internal pressure Quality analytical skills, exceptional relationship, management competencies and management experience Ability to influence, anticipate and assist the organization in assessing and maintaining its operations in a safe environment Demonstration ability to work with other staff and have passion for excellence Be realistic and understand the primary need to assess any security implication Emotional maturity Global perspective and multicultural approach and understanding A solid focus on fine details Excellent critical thinking and conceptual skills 6.0 Job advertisement In order to make the public aware of the vacant position, various channels and tools will be used to advertise the position. This includes the social media, dailies, weekly magazines, company websites and internal memos. The department in charge of communication will be mandated to plan and execute advertisement requirements. It will liaise with the financial department to finance the advertising activities. 7.0 Selection panel and their roles The selection panel will consists of; a) The Chairman b) Independent person- Security oriented c) HR representative d) Departmental representative Role of the chairman Require the panel to disclose declaration of interest, if any. Ask the HR representative to brief the selected pane on the requirement of the post. Welcome the interviewees In case of inappropriate question, rule out Ensure the candidate has the right picture of the job Keep notes on the process of making decision Ensure that the interview is transparent and fair Lead the panel’s assessment and discussion Give feedback or request a member of the panel Settle on the salary to be offered and other duties Sign the interview panel minute sheet Role of independent personnel Ensure the question asked are accordance to the set criteria Ensure the candidate being appointed meet the laid out standards Role of departmental Representatives Planning the interview questions Briefing the panel the requirement of the position Answer question based on their department from the interviewees Arrange appropriate paperwork to be given to the HR Role of HR representative Scrutinize the application forms and resumes’ Ensure the question asked are as per the criteria Spend time with the interviewees before entering into the room Answer questions relating to the HR department as asked by the candidate Write notes as per required 8.0 Rating scale Competency Rating (1-5) Effective Planning and Organization Initiative Technical Aptitude Judgment/Decisiveness Systematic Problem Solving Teamwork Interpersonal Communication Punctuality Accountability Total all competencies Ratings: 5 = Outstanding 4 = Very Strong 3 = Competent 2 = Underdeveloped 1 = Not developed 9.0 Selection method The panel will have an in-depth of the knowledge requirement for the position and will select a candidate using the following selection method; The selected candidate will have; a) Written an application that will have addressed knowledge, skills and abilities needed to perform the duties b) Attend interview whereby series of appropriate questions will be asked to check whether the application matches with the person c) Reference check- applicants will submit names of three referees who may comment on their working status d) Psychological assessment and security clearance so that the applicant may be entitled for employment. 10.0 Interview Schedule Interviews will be conducted twice added as illustrated below and the candidate are required to keep time. MORNING INTERVIEW AFTERNOON INTERVIEW 8:30 a.m. 1:00 p.m. Candidate report to the waiting room And meet HR representative 9:00 a.m. Interviewees prepare 1:30 p.m. Interviewees prepare 9:15 a.m. Groups 1:45 p.m. Groups Reports about the organization 10:00 a.m. Candidate’s PRESENTATION Q & A 2:30 p.m. Candidate’s PRESENTATION Q & A Interview room 10:15 a.m. BREAK 2:45 p.m. BREAK 10:30 a.m. Candidate Alone Assessment 3:00 p.m. Candidate Alone Assessment Answer questions online and send through email 10:45 a.m. Feedback from the chairman 3:15 p.m. Feedback from the chairman Meet the chairman in the waiting room for feedback and way forward Work cited; Brown, Matthew, Christie Rewey and Troy Gagliano. “Energy security.” The Forum for America's Ideas. Washington: National Conference of State Legislatures, 2003. 22. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Issues in the Massive Gas Plant Company's Management Case Study, n.d.)
Security Issues in the Massive Gas Plant Company's Management Case Study. https://studentshare.org/management/2063296-you-as-the-security-director-are-required-to-submit-in-a-report-format-the-following
(Security Issues in the Massive Gas Plant Company'S Management Case Study)
Security Issues in the Massive Gas Plant Company'S Management Case Study. https://studentshare.org/management/2063296-you-as-the-security-director-are-required-to-submit-in-a-report-format-the-following.
“Security Issues in the Massive Gas Plant Company'S Management Case Study”. https://studentshare.org/management/2063296-you-as-the-security-director-are-required-to-submit-in-a-report-format-the-following.
  • Cited: 0 times

CHECK THESE SAMPLES OF Running of Security Issues in Company

Information and Systems Security

With this ease of information access comes the issue of security.... hreatsRisk of DataData is the most crucial asset of a company.... There are many issues to be considered when making policies for network security.... The three main issues back in the earlier days were Confidentiality, Integrity, and Availability.... Due to the advances in technologies, these issues have been mostly resolved.... But in the present-day Networks, other issues have appeared....
6 Pages (1500 words) Assignment

US Company Expanding to Italy

The paper 'US company Expanding to Italy' looks at foreign businesses, which are exploited through regulations, practices, and laws that are usually protective of the local businesses.... Other laws include the Fair Labor Standards Act, Equal Opportunity Employment, Employee Retirement Income security Act and many other laws that regulate employees' welfare.... The Employee Retirement Income security Act (ERISA) seeks to make sure that every employee receives retirement benefits according to her own choice (Cihon & Castagneria, 2013)....
9 Pages (2250 words) Assignment

Securing Windows and Unix/Linux Servers

Although network administrators often overlook it, physical security of network servers should always be addressed just like other security issues.... Attacks on computer servers can also lead to crashing of the servers that may develop setbacks to the company and secure the servers prevents this.... The author of this case study "Securing Windows and Unix/Linux Servers" casts light on the information security.... It is mentioned that operators of Windows and Unix Linux servers, which provide network services, should always ensure the servers' security because of the servers' vulnerabilities....
3 Pages (750 words) Case Study

Security Best Practice Guidelines for Businesses

By implementing good company policies and ensuring that best practices against these attacks are used, an organization should be able to mitigate the risks found in the User Domain.... There isn't much discussion about F5 load balancing or bandwidth issues either that the user can run into with an NSM.... The author of this essay entitled "security Best Practice Guidelines for Businesses" touches upon the Intrusion Detection System (IDS) which is a critical precautionary tool that monitors the network through monitoring packets that are passed within users....
4 Pages (1000 words) Admission/Application Essay

Network Security

The needs of users of the data provided via a network and subsequently develop a security policy and plan that addresses the security issues concerned.... In client/server systems centralized security services may be impractical since they may not scale well, which leads to high vulnerability of the network to security issues is at stake.... With business organizations and their stakeholders developing complex networks, security issues become a key factor of consideration....
8 Pages (2000 words) Essay

The Primary Objectives of Information Security

security policy acts as a centralized crucial document that will help in eliminating the risk of security breaches by securing the confidential information stores from getting disclosed to unauthorized persons.... A company's sensitive information is at stake more due to the illiteracy of the authorized staff, which handles the information, regarding information security.... It is vital for a company or an organization to design and implement a security policy regarding the protection of information before starting sensitive projects....
6 Pages (1500 words) Coursework

The Position of Security Manager in Corporate Security

security issues that concern corporations can range from the security of information to the physical security of the premise where the corporation conducts its business.... The paper "The Position of security Manager in Corporate Security " is a wonderful example of a term paper on human resources.... For a corporation to be successful, it needs to ensure that it has covered all aspects of security within the organization because a small loophole could mean the undoing of the corporation....
11 Pages (2750 words) Term Paper

Acer Laptop - Information Security Evaluation

fter undertaking extensive research, I intend to use the Rick Hellewell checklist as it helps to address most issues associated with home computer security such as viruses, hacking, and worms.... The paper "Acer Laptop - Information security Evaluation" is an outstanding example of an information technology case study.... The paper "Acer Laptop - Information security Evaluation" is an outstanding example of an information technology case study....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us