Security Management Specialists

Business Management & Administration > Operations Management

Projected Growth: Average

Projected Job Openings

Considerable Preparation Needed

Job Description

Your job is to Conduct security assessments for organizations, and design security systems and processes. May specialize in areas such as physical security, personnel security, and information security. May work in fields such as health care, banking, gaming, security engineering, or manufacturing.

Common job titles of Security Management Specialists include:

Experience and Education

A considerable amount of work-related skill, knowledge, or experience is needed for this occupation. For example, a person in this occupation must complete four years of college and work for several years in industry to be considered qualified.

  • 61.54% said they needed a Bachelor's Degree.

  • 15.38% said they needed a Associate's Degree.


    Determine the value loss impact and criticality of assets.

    Assess the nature and level of threats so that the scope of the problem can be determined.

    Conduct security audits to identify potential vulnerabilities related to physical security, staff safety, or asset protection.

    Perform risk analyses so that appropriate countermeasures can be developed.

    Design security policies, programs, or practices to ensure adequate security relating to asset protection, alarm response, access card use, and other security needs.

    Develop or review specifications for design or construction of security systems.

    Recommend improvements in security systems or procedures.

    Inspect fire, intruder detection, or other security systems.

    Review design drawings or technical documents for completeness, correctness, or appropriateness.

    Test security measures for final acceptance and implement or provide procedures for ongoing monitoring and evaluation of the measures.

    Outline system security criteria for pre-bid meetings with clients and companies to ensure comprehensiveness and appropriateness for implementation.

    Design, implement, or establish requirements for security systems, video surveillance, motion detection, or closed-circuit television systems to ensure proper installation and operation.

    Provide system design and integration recommendations.

    Engineer, install, maintain, or repair security systems, programmable logic controls, or other security-related electronic systems.

    Inspect security design features, installations, or programs to ensure compliance with applicable standards or regulations.

    Monitor the work of contractors in the design, construction, and startup phases of security systems.

    Prepare, maintain, or update security procedures, security system drawings, or related documentation.

    Train personnel in security procedures or use of security equipment.

    Develop conceptual designs of security systems.

    Budget and schedule security design work.

    Monitor tapes or digital recordings to identify the source of losses.

    Respond to emergency situations on an on-call basis.

    Interview witnesses or suspects to identify persons responsible for security breaches or to establish losses, pursue prosecutions, or obtain restitution.

    Prepare documentation for case reports or court proceedings.


X ray screening equipment

Videoconferencing equipment

Tablet computers

Personal computers

Network video recorders

Mechanical access control systems


All Tools

Intrusion detection systems

Electronic access control systems

Digital video recorders

Desktop computers

Computer server equipment

Computer network routers

Closed circuit television CCTV monitoring systems

Card readers

Audioconferencing equipment

Approach detection systems


Adobe Systems Adobe Acrobat

Advanced business application programming ABAP

Autodesk AutoCAD




Extensible markup language XML

All Technologies



Microsoft .NET Framework

Microsoft SharePoint

Microsoft SQL Server

Microsoft Windows


Oracle Business Intelligence Enterprise Edition

Oracle JavaServer Pages JSP

Oracle Solaris

Practical extraction and reporting language Perl



SAP Crystal Reports

Splunk Enterprise



Virtual private networking VPN software


AccessData FTK

Adobe Systems Adobe ActionScript

Adobe Systems Adobe Cold Fusion

ArcSight Enterprise Threat and Risk Management


Chinotec Technologies Paros

Cisco Systems CiscoWorks

Customer information control system CICS

e-fense Helix3

Enterprise JavaBeans

Firewall software

Guidance Software EnCase Forensic

Hewlett Packard HP-UX

IBM Informix

Intrusion prevention system IPS


Live memory collection software



Microsoft Windows PowerShell



Oracle Java EE

Photo editing software

Physical access management software

Secure web gateway software

Social networking software

Symantec PGP



Videoconferencing software

Volatile Systems Volatility


Critical Thinking

Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.

Active Listening

Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.


Talking to others to convey information effectively.

Judgment and Decision Making

Considering the relative costs and benefits of potential actions to choose the most appropriate one.

Reading Comprehension

Understanding written sentences and paragraphs in work related documents.


Communicating effectively in writing as appropriate for the needs of the audience.

Complex Problem Solving

Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.

Active Learning

Understanding the implications of new information for both current and future problem-solving and decision-making.


Adjusting actions in relation to others' actions.

Service Orientation

Actively looking for ways to help people.


Monitoring/Assessing performance of yourself, other individuals, or organizations to make improvements or take corrective action.

Social Perceptiveness

Being aware of others' reactions and understanding why they react as they do.

Systems Analysis

Determining how a system should work and how changes in conditions, operations, and the environment will affect outcomes.

Systems Evaluation

Identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.

Time Management

Managing one's own time and the time of others.


Teaching others how to do something.


Persuading others to change their minds or behavior.

Operations Analysis

Analyzing needs and product requirements to create a design.


Communicate information and ideas in speaking so others will understand.

Cognitive Abilities › Verbal Abilities › Oral Expression

Tell when something is wrong or is likely to go wrong. It does not involve solving the problem, only recognizing there is a problem.

Cognitive Abilities › Idea Generation and Reasoning Abilities › Problem Sensitivity

Listen to and understand information and ideas presented through spoken words and sentences.

Cognitive Abilities › Verbal Abilities › Oral Comprehension

Apply general rules to specific problems to produce answers that make sense.

Cognitive Abilities › Idea Generation and Reasoning Abilities › Deductive Reasoning

Read and understand information and ideas presented in writing.

Cognitive Abilities › Verbal Abilities › Written Comprehension

Communicate information and ideas in writing so others will understand.

Cognitive Abilities › Verbal Abilities › Written Expression

Combine pieces of information to form general rules or conclusions (includes finding a relationship among seemingly unrelated events).

Cognitive Abilities › Idea Generation and Reasoning Abilities › Inductive Reasoning

TEST Your output This field is empty or does not exist This field is empty or does not exist

Occupation Sections


No areas of knowledge found

Real People, Real Stories

Would you look at that! Unfortunately, we don't seem to have any real life stories related to Security Management Specialists.

Perhaps you'd like to be the first? If so, let's talk about featuring your story!