Security Management Specialists
SOC: 13-1199.02

Description:

Conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security, personnel security, and information security. May work in fields such as health care, banking, gaming, security engineering, or manufacturing.


National Salary Information:

Hourly Statistics:

Annual Statistics:

Source: Bureau of Labor Statistics 2015 wage data.


Employment Projections:

Employment (2014):
998,000 employed

Projected (2024):
1,046,000 employed

Projected growth (2014-2024)


Source: Bureau of Labor Statistics 2015 2014-2024 employment projections external site. "Projected growth" represents the estimated change in total employment over the projections period (2014-2024). "Projected job openings" represent openings due to growth and replacement.


Alternate Titles:

  • Consultant
  • Director, Security Risk Management
  • Electronic Security Specialist
  • Operations Specialist
  • Operations Staff Specialist, Security
  • Personal Protection Specialist
  • Personal Security Specialist
  • Physical Security Engineer
  • Physical Security Manager
  • Physical Security Specialist
  • Principal Engineer, Security Engineering and Applied Science
  • Section Chief, Physical Security Specialist
  • Security Administrator
  • Security Analyst
  • Security Consultant
  • Security Engineer
  • Security Management Specialist
  • Security Specialist
  • Security System Engineer
  • Security Systems Specialist
  • Workplace Violence Prevention Specialist


  • Job Zone Four: Considerable Preparation Needed

    Experience:

    A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.

    Education:

    Most of these occupations require a four-year bachelor's degree, but some do not.

    Job Training:

    Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.


    Required Skills:

  • Reading Comprehension
  • Active Listening
  • Writing
  • Speaking
  • Mathematics
  • Science
  • Critical Thinking
  • Active Learning
  • Learning Strategies
  • Monitoring
  • Social Perceptiveness
  • Coordination
  • Persuasion
  • Negotiation
  • Instructing
  • Service Orientation
  • Complex Problem Solving
  • Operations Analysis
  • Technology Design
  • Equipment Selection
  • Installation
  • Programming
  • Operation Monitoring
  • Operation and Control
  • Equipment Maintenance
  • Troubleshooting
  • Repairing
  • Quality Control Analysis
  • Judgment and Decision Making
  • Systems Analysis
  • Systems Evaluation
  • Time Management
  • Management of Financial Resources
  • Management of Material Resources
  • Management of Personnel Resources

  • Knowledge Used:

  • Administration and Management
  • Clerical
  • Economics and Accounting
  • Sales and Marketing
  • Customer and Personal Service
  • Personnel and Human Resources
  • Production and Processing
  • Computers and Electronics
  • Engineering and Technology
  • Design
  • Building and Construction
  • Mechanical
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Psychology
  • Sociology and Anthropology
  • Geography
  • Medicine and Dentistry
  • Therapy and Counseling
  • Education and Training
  • English Language
  • Foreign Language
  • History and Archeology
  • Philosophy and Theology
  • Public Safety and Security
  • Law and Government
  • Telecommunications
  • Communications and Media
  • Transportation


  • Tasks:

  • Prepare documentation for case reports or court proceedings.
  • Review design drawings or technical documents for completeness, correctness, or appropriateness.
  • Monitor tapes or digital recordings to identify the source of losses.
  • Interview witnesses or suspects to identify persons responsible for security breaches, establish losses, pursue prosecutions, or obtain restitution.
  • Budget and schedule security design work.
  • Develop conceptual designs of security systems.
  • Respond to emergency situations on an on-call basis.
  • Train personnel in security procedures or use of security equipment.
  • Prepare, maintain, or update security procedures, security system drawings, or related documentation.
  • Monitor the work of contractors in the design, construction, and startup phases of security systems.
  • Inspect security design features, installations, or programs to ensure compliance with applicable standards or regulations.
  • Inspect fire, intruder detection, or other security systems.
  • Engineer, install, maintain, or repair security systems, programmable logic controls, or other security-related electronic systems.
  • Recommend improvements in security systems or procedures.
  • Develop or review specifications for design or construction of security systems.
  • Design security policies, programs, or practices to ensure adequate security relating to issues such as protection of assets, alarm response, and access card use.
  • Perform risk analyses so that appropriate countermeasures can be developed.
  • Conduct security audits to identify potential vulnerabilities related to physical security, staff safety, or asset protection.
  • Provide system design and integration recommendations.
  • Assess the nature and level of threats so that the scope of the problem can be determined.
  • Design or implement or establish requirements for security systems, video surveillance, motion detection, or closed-circuit television systems to ensure proper installation and operation.
  • Determine the value loss impact and criticality of assets.
  • Outline system security criteria for pre-bid meetings with clients and companies to ensure comprehensiveness and appropriateness for implementation.
  • Test security measures for final acceptance and implement or provide procedures for ongoing monitoring and evaluation of the measures.

  • Tools & Technology:

  • Approach detection systems
  • Audioconferencing equipment
  • Card readers
  • Closed circuit television CCTV monitoring systems
  • Computer network routers
  • Computer server equipment
  • Desktop computers
  • Digital video recorders
  • Electronic access control systems
  • Intrusion detection systems
  • Magnetometers
  • Mechanical access control systems
  • Network video recorders
  • Personal computers
  • Tablet computers
  • Videoconferencing equipment
  • X ray screening equipment
  • AccessData FTK
  • Adobe Systems Adobe Acrobat software
  • Adobe Systems Adobe ActionScript
  • Adobe Systems Adobe ColdFusion
  • Advanced business application programming ABAP
  • ArcSight Enterprise Threat and Risk Management
  • Autodesk AutoCAD software
  • C
  • C#
  • C++
  • Chinotec Technologies Paros
  • Cisco Systems CiscoWorks software
  • Database software
  • e-fense Helix3
  • Enterprise JavaBeans
  • Extensible markup language XML
  • Firewall software
  • Guidance Software EnCase Forensic
  • IBM Informix
  • Intrusion prevention system IPS software
  • JavaScript
  • Kismet
  • Linux
  • Live memory collection software
  • McAfee software
  • Metasploit
  • Microsoft .NET Framework
  • Microsoft Access
  • Microsoft Excel
  • Microsoft Office software
  • Microsoft PowerPoint
  • Microsoft SharePoint software
  • Microsoft Visio
  • Microsoft Visual Basic
  • Microsoft Windows
  • Microsoft Windows PowerShell
  • Microsoft Word
  • MySQL software
  • Nessus
  • Nmap
  • Oracle Java
  • Oracle Java EE
  • Oracle software
  • Oracle Solaris
  • Photo editing software
  • PHP: Hypertext Preprocessor
  • Physical access management software
  • Practical extraction and reporting language Perl
  • Python
  • Ruby
  • SAP software
  • Secure web gateway software
  • Social networking software
  • Splunk Enterprise
  • Structured query language SQL
  • Symantec PGP
  • Symantec security software
  • Tivoli
  • TrueCrypt
  • UNIX
  • Videoconferencing software
  • Virtual private networking VPN software
  • Volatile Systems Volatility
  • Web browser software
  • Wireshark


  • business and financial operations


    industry stats

    SOC: 13-0000

    Total Employed: 7,032,560

    Average Annual Salary: $73,800