Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The paper " A Critical Analysis of the Provided Security Related Job " is a great example of a term paper on management. There are many security-related jobs each with diverse job descriptions and requirements…
Download full paperFile format: .doc, available for editing
Extract of sample "A Critical Analysis of the Provided Security Related Job"
Table of Contents
Introduction 2
Analysis of the job descriptions 2
Content and Thematic Analysis 4
The overarching themes: The emerging similarities and differences 9
Discussion 10
Conclusion 10
References: 11
CRITICAL REVIEW
Introduction
There are many security related jobs each with diverse job descriptions and requirements. Through the jobs, the society is able to guarantee itself security and wellbeing whether the security is to do with property, people or even cyber related security. In fact, the security domain also involves such other matters as the way the government secures a nation through the department of defense and even the safety of workers in the workplace or what is commonly referred to as workplace health and safety. It is to be noted that though these areas may be diverse, they have some commonalities in that they are aimed at securing a nation, property, cyberspace among other places depending on the kind of job in question (Atkin and Brooks, (2015). Another similarity arises in the kind of job requirements including educational and training requirements, experience requirements as well as some knowledge, skills and attributes. It is to be noted that the jobs in the security domains also differ along these lines. This paper is prepared with an aim of bringing out these similarities and differences of the jobs in the security domain by conducting a critical analysis of five different security related job titles (Daft, 2015). The job analysis presents the job specific and converged themes in terms of knowledge, skills and attributes for the jobs. In so doing, the paper has successfully brought out the diversity of the jobs in the security domain.
Analysis of the job descriptions
i) Senior VP, Head of Security Management –Corporate Banking
VP head of security will be in charge of the Security management function and the Security management team while formulating related policies and strategies (Fitzgerald, 2002). He will ensure the bank is abreast with latest market developments of security management best practice and educate employees on such issues. He will manage, motivate, monitor and give feedback on members’ performance while fostering their development. He will also coach team in line with business strategy and ensure quality and timely work completion by employees.
ii) Security specialist at Jacobs
The security specialist will work as a consulting team member on a variety of projects while providing security systems related advice to clients. He will foster the security team growth through quality customer service while determining project scope and fees for clients (Heizer and Render, 2001). He will ensure good time management and cost control so that projects are completed within budgets.
iii) Physical security specialist
The specialist will be in charge of a number of specialized duties that support the organizations overall security program. The roles will include formulating of security policies and procedures as well as budgetary management and controls. He will be responsible for fire system project management, physical security, security system support for sensitive investigations and educating and training others on security program. The person will continually develop while ensuring longevity and functionality of JEA’s physical security and fire systems providing security for its staff and property on a continuous basis.
iv) DOD Security manager
The security manager will be a team leader, manage allocated resources and set work area priorities while developing and managing related strategies. He will ensure accurate work completion within time and quality limits and also leads and manage provision of protective security advice to stakeholders in supporting security policies and related procedures. He will develop, implement and monitor completion of assurance programs ensuring compliance with government security policies while managing security risk and advising on emerging issues on security. He will educate on security strategies and foster a positive security culture while advocating for corporative relationships among stakeholders of security. He will influence and coach team members to collaborate while assessing and endorsing related security reports.
v) Compliance and Risk Management Advisor
The advisor will collaborate with Gallery’s executive team in managing and maintaining safe and secure working environment for the gallery’s property while developing and implementing related security procedures for ensuring protective security. He will manage the organizations work health and safety management system though conducting WHS risk assessments while developing and implementing related procedures and policies. He will also educate the organization’s employees on work health and safety issues. He will conduct the organization’s risk reviews and maintain its risk register and foster a risk awareness culture through staff training and come up with risk management policies. He will manage the organization’s business continuity planning and foster emergency preparedness. He will implement fraud prevention and control framework and act as the organization’s fraud control officer while keeping the organization informed on market developments on various security issues while being answerable to the board on various security issues.
Content and Thematic Analysis
This section deals with the knowledge, skills and graduate attributes requirements for the various jobs in the security domain. In so doing, the above five jobs are analyzed on the knowledge, skills, and graduate attributes requirements in a bid to show the differences and similarities of the various jobs in the security domains as far as job requirements are concerned.
According to Herrmann (2015), knowledge, skills and graduate attributes represent a cluster of competencies that are required for one to perform a certain job. Knowledge in this case refers to an organized body of information that is factual or procedural in nature that is applied would make the person to adequately perform the job as much as possible. In other words, the bod of information is applied directly to the performance of the job functions. Skills on the other hand could be defined as the proficient manual including verbal or mental manipulation of things or data and are readily measurable through performance tests where quality and quantity of performance are tested on an established time limit. These include such things as manipulating data (Hobbs, 2015). Attributes refer to the power of performing an observable activity at the present time and are evidenced through activities and behaviour similar to the ones required for the job for instance being able to plan and organize ones work. The knowledge, skills and attributes are important since they define the qualifications that one has to specifically have for a certain job (Wolpert, 2015). They are the qualities that set one candidate apart from the others and hence help in identifying the candidate that is best suited for a certain job. They may be acquired through education or experience (Löckenhoff, 2015). The table below details out the various knowledge, skills and graduate attribute requirements for the security related jobs above;
Job
Skills and Knowledge
Roles
Qualifications
Attributes
Senior VP, Head of Security Management –Corporate Banking
-Security planning, strategy and design and risk management skills
-information systems and security risks knowledge.
-Coaching skills and team management skills
-Numerical skills
-Managing, supervising and motivating team members, and monitoring their performance and giving them provide feedback (Kimmel, 2009).
-managing Security management function and the Security management team
-formulating security policies and strategies
-educating employees
-Keeping organization abreast with current development in security matters
-Ensure quality and timely completion of work by team members.
-experience in corporate banking and risk management function.
-experience in identification and resolving security management threats
-experience in managing, coaching and driving teams
-experience in preparing and presenting presentations
-Front office experience
-FINSIA Qualification
-attention to details
- Self-motivated, imitative and independence
-Communication skills
Security specialist at Jacobs
-excellent knowledge of -Australian security policies, procedures and policies
-skills in security planning, risk management strategy and design
-Good communication skills
-Time management skills
-consulting on a diverse range of projects
-giving specialist advice to clients
-positive engaging clients on security matter to ensure growth of the security team
-determine and document project scope and prepare fee proposals for clients
-Budgetary control
10yearstechnical and project manage-nt experience
-relevant vocational education qualifications including bachelor’s degree in relevant fields
-be self-motivated and show initiative
-ability to work independently or as a team member
Physical security specialist
- Manage, supervise and motivate team members, monitor performance and provide feedback
- High accuracy and attention to detail
-ability to develop, implement and review security related policies
-coaching and managing team members
-effective decision making
-Formulation of security policies, procedures, budgetary management and controls, physical security and fire system project management
-administration of security management contracts
-security system support for sensitive investigations
-security program education and training
-continued development, functionality and longevity of physical security/fire systems
-relevant experience in the field
-driver’s licence
-manufacturer certification
-PSP, AMAG Technology and GSI video surveillance systems, NERC CIP PRA and BASA/FAS certifications
-Communication skills
-Self-motivated and independent
-Judicious
DOD Security Manager
- High accuracy and attention to detail
- Excellent knowledge of Australian security policies, practices and procedures including skills in security planning, risk management, strategy and design
- complex problem solving and issue management skills
- Knowledge and compliance with legislative frameworks, government decision-making and defense’s mission and policy requirements
-ability to develop and implement related policies
-Coaching and managing the team
-Effective decision making
-Knowledge of the protective security in the field (Lynch, 2015).
-leading, managing team an resources
-accurate and timely work completion
-lead and manage provision of security advice to stakeholders
-develop, implement and monitor assurance programs
-ensure organisation is at par with emerging security issues
-raise security awareness and positive security culture
-Coach team members
-Bachelor’s degree
-ability to communicate
-professional certification and membership
-work related experience
- Communication skills
-Self-motivated and independent
-Judicious
Compliance and Risk Management Advisor
Manage, supervise and motivate team members, monitor performance and provide feedback
- Knowledge of information systems and security risks
-ability to develop and implement related security policies
-Coaching and managing team members
-Effective decision making
-Knowledge of the protective security in the field (Montana and Charnov,2015).
- Day to day running and management of security management function
- manage key stakeholder relationship
-embed security policies while educating employees and updating them on security matters and issues
- Managing, supervising and motivating team members and monitoring performance and providing feedback and fostering their development
- Ensure employees complete work within organizational operational policies and meeting compliance requirements
- Coaching team to ensure their development is in line with business strategy and employees to stay up to date with security management and IT developments impacting the organization
- Monitoring of security units performance
A certificate IV in work health and safety and a certificate IV in investigation.
-Work experience
-
-Communication skills
-Self-motivated and independent
-Judicious
The overarching themes: The emerging similarities and differences
The above analysis has revealed some similarities as well as the differences that exist in the requirements, roles and responsibilities for the five jobs analyzed (Robbins and Coulter, 2005). This therefore has acted to enlighten on the diversity of the jobs in the security domain.
There was noted to be a similarity in the fact that all the jobs include requirements for a certain level of education as well as training. It is however to be noted that differences might arise from one job to the other depending on what kind of security job it is and whether it is to be found at the management level or not (Coulter, 2015). The jobs were also noted to have similarities in terms of requiring differing levels of experience in the relevant fields. Similarly, the requirement for experience differs from one job to the other. All the security jobs at the management level require some certain levels of team members management, coaching, motivation and monitoring. However, the specific requirements for team management skills differ from one job to the other. All the jobs were noted to have a requirement for excellent communication and interpersonal skills since each position would include communicating within the team as well as with various stakeholders in the security sector (Robbins, 2015). The jobs also required the job seekers to have excellent risk management skills while being able to develop and implement related security management policies. However, it is to be noted that the jobs required different level of certification with some jobs requiring no certification at all (Rothaermel, 2015). It is only one job that was noted to require numerical skills while another required driving license with others not requiring time management skills.
Discussion
The analysis above has revealed that security domain jobs are largely similar in terms of roles; skills; knowledge and graduate attribute requirements (Samson and Daft, 2015). It is however to be noted that specific requirements for instance of education and experience may differ from one job to the other. It is to be noted that a security job with regardless to its nature will require one to play the role of protecting property and people. This is regardless of whether the security in question refers to cyber security, normal physical security from such things as theft or work related health and safety (Schermerhorn, 2015). The need for the security sector workers to always be informed on the developments in the sector has also be identified to ensure that skills match reality at all times. Another key aspect noted was that almost all the security jobs would require acting as a team members and managing and motivating the team members as well. This is because security cannot be enforced in a vacuum but people have to corporate in ensuring security (Stevenson, 2015). The major differences were however noted to be in the diversity of the various jobs. It would be hard to imagine that such jobs as those dealing with work health and safety issues, department of defense, cyber security, banking security and normal physical and protective security are to be termed as physical jobs (Xu, 2015). This means that anyone willing to work in the sector has a wide range of jobs to choose from.
Conclusion
In conclusion, several factors that have been pointed out in the study are applicable to the real life situation. This is in terms of the criterion that is required for people that are applying for senior posts in organizations and companies. Some of the attributes that have been pointed out that should be maintained and enhanced include the high degrees of judgment and decision-making (Zhang and Gao, 2015). There is also the emphasis of attention on the professionalism and competence of the applicants. It is through this, that the firms and the management are able to attain goals and plans set. The ability to work both independently and in teams is also an aspect that has been pointed out and that should be attained by the people applying for jobs. This is because it will aid in the goal attainment process of the companies.
References:
Atkin, B., & Brooks, A. (2015). Total facility management. New York: AMACOM
Daft, R. L. (2015). Management. Boston: Prentice Hall
Fitzgerald, S. P. (2002). Decision making. Oxford, U.K: Capstone Pub.
Heizer, J., & Render, B. (2001). Operations management. Upper Saddle River, N.J: Prentice Hall.
Herrmann, J. W. (2015). Engineering decision making and risk management. New York, NY: Three Rivers Press.
Hobbs, P. (2015). Project management. Upper Saddle River, NJ: Pearson Prentice Hall.
Wolpert, D. (2015). Decision making: Uncertainty, imperfection, deliberation and scalability. Boston: Prentice Hall.
Löckenhoff, C. E. (2015). Aging and decision making: Empirical and applied perspectives. Westport, Conn: Greenwood Press
Kimmel, S (2009). Management. Chatsworth, CA: Image Entertainment.
Lynch, R. L. (2015). Strategic management. New York: AMACOM
Montana, P. J., & Charnov, B. H. (2015). Management. Upper Saddle River, NJ: Pearson Prentice Hall.
Robbins, S. P., & Coulter, M. K. (2005). Management. Upper Saddle River, NJ: Pearson Prentice Hall.
Coulter, M. (2015). Management. New York, NY: Three Rivers Press.
Robbins, S (2015). Management: 7. Boston: Prentice Hall.
Rothaermel, F. T. (2015). Strategic management. San Francisco: Jossey-Bass.
Samson, D., & Daft, R. L. (2015). Management. Upper Saddle River, NJ: Pearson Prentice Hall.
Schermerhorn, J. R. (2015). Management. Eurostaf. Paris
Stevenson, W. J. (2015). Operations management. Australia: South-Western.
Xu, Z. (2015). Uncertain multi-attribute decision making: Methods and applications. New York: AMACOM
Zhang, G., Lu, J., & Gao, Y. (2015). Multi-level decision making: Models, methods and applications. New York, NY: Three Rivers Press.
Read
More
Share:
CHECK THESE SAMPLES OF A Critical Analysis of the Provided Security Related Job
Business analysis encompasses assessments, studies, and analysis of the business functions applied with IT and software applications.... The researcher of this essay aims to define the job functions of business and systems analysts in organisations.... job compositions and functions in organisations have been modified and complicated with the advent of globalisation and technology.... 4 Chapter analysis …………………………………………………………....
The paper 'job Security and Its Impact on National Security' is aimed at investigating the effects of job security in the UAE together with its impacts on national security.... n this respect, therefore, this study is aimed at investigating the various effects of job security in the United Arabs Emirates together with its impacts on the national security of the country.... Predicting the impact of job security and employment among youths to the public policy and law enforcement in the nation could be of much significance in the making of informed decisions thus reducing the law enforcement costs and enhancing the effectiveness of the anti-crime strategies (Torka and Schyns, 2007)....
The security companies consider on-the-job training as an additional expense instead of taking as a way to increase the capability of security personnel to appropriately meet the security threats.... In the private security industry part, basic private security industry related information has been provided.... The dissertation 'Qualification Requirements of security Personnel in the UK' estimates the current provided and required qualification standards appropriately aligned to meet the demands of the roles in which the UK frontline security staff are employed....
The paper "critical analysis of Security-Related Job Titles " is a great example of a report on human resources.... The paper "critical analysis of Security-Related Job Titles " is a great example of a report on human resources.... The emergence of these security domains has resulted in the information and availability of job vacancies to the citizens who are in need of job vacancies.... To ensure that this analysis is kept up to date, some job vacancies advertised by several companies on security must be reviewed and analyzed....
The paper "My critical analysis of Five Security Related Jobs " is a good example of a report on human resources.... The paper "My critical analysis of Five Security Related Jobs " is a good example of a report on human resources.... This report presents my critical analysis of five security-related jobs that were provided.... It incorporated the knowledge, skills, attributes, and academic qualifications for the respective job positions and the manner in which these requisites relates to the security theory and academic attributes in general....
This report will conduct a critical analysis of Cryptography and Application and Systems Development Security to conduct related job titles (Edward, 2005).... The analysis of these two jobs will include micro-focus that highlights the two positions and macro-level analysis indicating similarities and differences for the two positions.... his job entails the use of a combination of information engineering, data modelling, sampling and accounting principles (Anderson, 2003), mathematical model building to ensure comprehensive and efficient designs (Fennelly, 2004)....
The paper "Analysis of Two Security-related job Postings and How Jobs Relate to the Security Theory " is a perfect example of a term paper on human resources.... The paper "Analysis of Two Security-related job Postings and How Jobs Relate to the Security Theory " is a perfect example of a term paper on human resources.... The purpose of this paper is to carry out an analysis of two security-related job postings and how the jobs relate to the security theory (Harr & Hess, 2010)....
This paper seeks to explore a critical analysis of the above security job titles.... The paper "critical analysis of Security Job Titles" is a good example of a term paper on human resources.... The paper "critical analysis of Security Job Titles" is a good example of a term paper on human resources.... It describes the specific jobs, analysis of themes based on the job titles, skills, knowledge, and attribute basics, and the manner through which these requisites connect to security theory and general academic requirements....
8 Pages(2000 words)Term Paper
sponsored ads
Save Your Time for More Important Things
Let us write or edit the term paper on your topic
"A Critical Analysis of the Provided Security Related Job"
with a personal 20% discount.