Back to Explore
TASK
Security Management Specialists
ID
work_business_financial/security_management_specialists
Type
TASK
Children
23
Child Nodes (23)
ATOMIC
Assess the nature and level of physical security threats so that the scope of the problem can be determined.
ATOMIC
Respond to emergency situations on an on-call basis.
ATOMIC
Recommend improvements in security systems or procedures.
ATOMIC
Perform risk analyses so that appropriate countermeasures can be developed.
ATOMIC
Inspect physical security design features, installations, or programs to ensure compliance with applicable standards or regulations.
ATOMIC
Conduct security audits to identify potential vulnerabilities related to physical security or staff safety.
ATOMIC
Design security policies, programs, or practices to ensure adequate security relating to alarm response, access card use, and other security needs.
ATOMIC
Test security measures for final acceptance and implement or provide procedures for ongoing monitoring and evaluation of the measures.
ATOMIC
Design, implement, or establish requirements for security systems, video surveillance, motion detection, or closed-circuit television systems to ensure proper installation and operation.
ATOMIC
Prepare, maintain, or update security procedures, security system drawings, or related documentation.
ATOMIC
Prepare documentation for case reports or court proceedings.
ATOMIC
Develop conceptual designs of security systems.
ATOMIC
Train personnel in security procedures or use of security equipment.
ATOMIC
Review design drawings or technical documents for completeness, correctness, or appropriateness.
ATOMIC
Provide system design and integration recommendations.
ATOMIC
Monitor the work of contractors in the design, construction, and startup phases of security systems.
ATOMIC
Budget and schedule security design work.
ATOMIC
Inspect fire, intruder detection, or other security systems.
ATOMIC
Develop or review specifications for design or construction of security systems.
ATOMIC
Interview witnesses or suspects to identify persons responsible for security breaches or to establish losses, pursue prosecutions, or obtain restitution.
ATOMIC
Outline system security criteria for pre-bid meetings with clients and companies to ensure comprehensiveness and appropriateness for implementation.
ATOMIC
Monitor tapes or digital recordings to identify the source of losses.
ATOMIC