Security Careers -  James E. Foushee,  Stephen W. Walker

Security Careers (eBook)

Skills, Compensation, and Career Paths
eBook Download: PDF | EPUB
2014 | 3. Auflage
224 Seiten
Elsevier Science (Verlag)
978-0-12-800199-8 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
75,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethics occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foush‚e Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough understanding of competitive pay practices across the industry. This book can be used by anyone who manages security personnel or by security professionals who want to develop their careers. Security Careers is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and 'how-to' guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. - Fills the need for solid information based on accurate job descriptions and surveys of industry compensation professionals - Created for hands-on use: readers may use the job descriptions in their own hiring and staffing plans - Sheds light on compensation practices and shows security executives how to influence them

Mr. Walker is the senior partner of the Foush‚e Group, Inc. He has more than 18 years of experience in the management consulting field. He specializes in incentive plan design and implementation, salary and wage administration program development, and compensation survey design and development.In the field of compensation, Mr. Walker has managed projects in a variety of industries including high technology, engineering services, information systems, national laboratories, pharmaceutical, energy, and venture capital. He has worked with senior management to review and develop compensation programs that are designed to serve the business objectives and management philosophies unique to each organization.Mr. Walker holds a BS in business administration, and is a former Commissioned Officer in the United States Marine Corps. He is a frequent lecturer to professional and business groups, author, faculty member for the Security Executive Council, and is a member of a variety of human resources and compensation organizations. In 2009, Mr. Walker was voted one of the most influential people in security by Security magazine.
The third edition of Security Careers is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethics occupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushee Group, which has been conducting this research since 1980. Security Careers includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough understanding of competitive pay practices across the industry. This book can be used by anyone who manages security personnel or by security professionals who want to develop their careers. Security Careers is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "e;how-to"e; guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. - Fills the need for solid information based on accurate job descriptions and surveys of industry compensation professionals- Created for hands-on use: readers may use the job descriptions in their own hiring and staffing plans- Sheds light on compensation practices and shows security executives how to influence them

Chapter 2

The Role and Responsibilities of the Security Leader


Abstract


This chapter provides background information on the history of the security role and the recent shift in required skills. Traditionally, security leaders were generally drawn from other areas, including the government, from within the organization, information technology, and executive leadership. In this chapter, each of these four areas of experience are discussed in terms of history, strengths and drawbacks, transition challenges, and most transferable skills. This chapter also includes a self-assessment tool with 65 knowledge elements that today's security leader should possess.

Keywords


Background Experience Leadership skills Next generation leadership Risk Management Portfolio Security career Security Executive Council Security industry Security leader Transferable skills
Many security leaders in the United States and around the world say that security today requires a range of skills that goes far beyond the capabilities of a traditional security director. In addition to law enforcement and military skills, a security leader must understand his or her firm’s business, from finance and strategy to business continuity, competition, and profits. The security leader must employ executive leadership skills appropriate to the corporation as a whole. He or she must be able to communicate, manage large projects, create strategies, assemble cross-departmental teams, execute plans, and more.
A security leader must understand information technology (IT) security and must maintain an awareness of emerging issues that may affect the company. He or she must follow legislative and regulatory trends, developments in globalization, transnational crime, security research and development, and other trends that may one day alter the corporation’s fortunes.
Today’s most accomplished security leaders point to four general capabilities that define a modern security leader. First and foremost, a security head must understand his or her industry and company. Second, a security leader must develop a skill set that blends security, IT, business acumen, and the ability to identify and evaluate emerging issues. Third, a security leader must change with the time and grow with his or her company. Finally, he or she must possess an imagination capable of exploring for opportunities that will add value to the company.

Compare yourself against the security leader of the future


The following self-assessment tool lists 65 knowledge elements that can enhance the success of a security leader today. The skills fall under six general “knowledge streams” that produce six different kinds of values for businesses.
Law enforcement and military backgrounds, for example, provide knowledge of investigations and prosecutions. IT security skills help in the protection of critical information in both digital and printed formats. Business backgrounds help to align security value and business goals. A background career in corporate security ensures a security leader’s intimate knowledge of a company. Executive leadership skills produce a focus on business results. Awareness of emerging issues helps to maintain situational readiness.

Table 2.1

Next Generation Security Leadership

Value: Internal and External Situational Readiness Value: Alignment with Business Value: Business results and Leadership Value: Critical Information Protection Value: Intimate Knowledge of the Particular Company/Business Value: Risk Assessment & Mitigation
Laws and regulatory trends Finance Communication skills Network security Knowledge of the business Law enforcement
Cross-sector benchmarking Sector/Industry-specific knowledge Presentation skills Computer/Platforms security Corporate culture Criminal justice system
Globalization developments Business strategy Project management Applications Internal processes Investigations
Terrorism Customer relations Organization Data and privacy protection Employee familiarity Physical security systems
Transnational crime Organizational growth Business acumen IT policy Institutional memory Intelligence
Intellectual property protection Business/Employee law Strategic planning System integration Customers and issues Counter intelligence
Outsourcing offshore Business conduct and ethics Relationship management Operations continuity Strategic alliances Laws and ordinances
Gray Market/Counterfeiting Business continuity International experience Data forensics Brand/Reputation risk issues Command and control
Security R&D Business value measures/metrics Team building Data integrity investigations Asset protection Leadership training
Competitive dynamics Negotiation skills Supply chain protection Public sector access
Profit and loss (P&L) Decision skills Incident response Information protection
Cost control Crisis management Emergency preparedness/response
Policy and awareness

Rate each element as: E = Expert, A = Adequate, I = Needs Improvement, M = Missing, or N/A = Not applicable to my situation or industry.

How well do you and your staff stack up to the security leader of the future? Evaluate yourself against each of the skills noted in Table 2.1 . Assign a rating for each of the skills as follows:
E = Expert. These are skills you already possess.
A = Adequate. These are skills you can brush up on pretty quickly.
I = Needs improvement. These are skills you know you could improve upon.
M = Missing. These are skills you have no experience with and know nothing about.
N/A = Not applicable. These are skills that are not applicable to your particular situation or industry.
For each “E” rating you assign for a skill, give yourself three points. For each “A” rating you assign, give yourself two points. Give yourself one point for each “I” rating, and no points for either an “M” or “N/A” rating. When you finish, count up your points. Give yourself an additional one point up to a maximum of five points for every year of experience you have in one of the following fields: law enforcement, IT, business, and security.
Next, divide your score by two to get your “Next Generation” score. Those scoring 90 to 100 points can consider themselves ready to take on the challenges of twenty-first century security. A score from 80 to 89 points limits the role and level of your position in the organization. If you scored below 80, you may be risking your future. You should take steps now to expand your range of skills.

The history of the security role and a shift in the skills required


Government experience


History

Many security professionals have some form of government background, such as military or law enforcement experience. Chances are that background has served them well up to this point, but they may now find their career growth stagnating in the face of new requirements for high-level security positions.
Military experience was a staple of security hiring requirements as far back as the 1950s, when businesses saw the advantage in bringing the military know-how of servicemen returning from World War II into their security organizations. Before long, private...

PDFPDF (Adobe DRM)
Größe: 5,4 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 4,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99